WP6 – Risk Analysis and Mitigation Strategies
Coordinated by
RES (M01-M16)
Objective
This work package researches and develops a methodology for continuous risk assessment process on the ICT supply chain, such that the system is continuously analyzed for potential weaknesses, and corresponding mitigation strategies can be enacted using BIECO solutions.
This WP has the following concrete objectives:
- To identify in an automated fashion main threats, including those that could also derive in a physical hazard in a cyber-physical system.
- To compute the severity of the consequences of threats and hazards.
- To make the link between systems’ internal security causes and their possible safety hazards explicit, e.g. in failure logic models such as Component Fault Trees.
- To define mitigation strategies.
- Out of both design time risk assessment models and mitigation strategies, runtime risk management models shall be synthesized systematically that are suitable to support runtime resilience mechanisms defined in WP4.
- Design and develop security, privacy and accountability measures for all the entities involved in the supply chain.
Envisioned mitigations range from process-based to architecture-based as well as related to the introduction of new patches and error detectors. The WP will ultimately produce a methodology and supporting tools for the systematic and automated i) analysis of risks, and ii) identification of mitigations that shall be equipped in the BIECO framework.
Deliverables
- D6.1 Blockly4SoS model and simulator WP6 (7 – RESILTECH) Report Public M10
- D6.2 Blockly4SoS user guide WP6 (7 – RESILTECH) Report Public M12
- D6.3 Risk Assessment and additional requirements WP6 (10 – 7BULLS) Report Public M24
- D6.4 Mitigations identification and their design WP6 (2 – Fraunhofer) Report Public M16
Outcomes
Monthly Wp3 meeting
BIECO WP3On November the 30th, it was taken the monthly Wp3 meeting. On it, it was updated the latest progress as well as future actions, and all WP3 members were coordinated in order to achieve the programmed objective.These advances were centered on both tasks T3.3...
WP7 monthly meeting M15
The 29th November took place the WP7 monthly meeting. As part of T7.3 we tried to instantiate and coordinate the different steps of the security evaluation methodology being developed in T7.2.
The BIECO Conceptual Framework Towards Security and Trust in ICT Ecosystems
The BIECO Conceptual Framework Towards Security and Trust in ICT Ecosystems Authors: Ricardo Peres, Lilian Adkinson, Emilia Cioroaica, Eda Marchetti, Enrico Schiavone, Sara Matheu, Ovidiu Cosma, Radoslaw Piliszek, Jose Barata Document type: Publication in Conference...
25th Nov – ICT Gateway
In the meeting on the 25th of November, we have defined templates for specifying vertical abstractions of components interacting with the ICT Gateway. When fed with real-time data, these abstractions become digital twins that are predictively evaluated in a simulation...
A MDE Tool for Security Risk Assessment of Enterprises
A MDE Tool for Security Risk Assessment of Enterprises Authors: Enrico Schiavone, Nicola Nostro, Francesco Brancati Document type: Publication in Conference proceedings Publication: INDUSTRY TRACK - LATIN-AMERICAN SYMPOSIUM ON DEPENDABLE COMPUTING (LADC), 10. , 2021,...
WP2 activities November
During November, WP2 partners have been refining the representations of data flows and component structures of the BIECO framework, which will be some of the core elements included in Deliverable 2.4. Even in the remote setting, interesting discussions have been...