Skip to content

Latest commit

 

History

History
48 lines (34 loc) · 2.27 KB

ODTMACCTP.md

File metadata and controls

48 lines (34 loc) · 2.27 KB

Academic Cloud Computing Threat Patterns (ACCTP) Model

This model is an ontological domain-specific threat model, which depicts common threats to cloud-based computer systems.

It is automatically generated from the ACCTP catalog.

Here are guide how to use the ACCTP model and instruction how to create cloud-specific threat models.

Proposed model of cloud computing environment contains a set of concepts, aimed to extend the base threat model with the cloud-specific entities.

acctp_concepts

Cloud threat patterns are organized into three base and four extended profiles.

acctp_profiles

The architecture profile contains threats related to a simple cloud system design, The compliance profile holds threats close to responsibilities of cloud actors, cloud environment, and legal issues. The privacy profile is about confidentiality of information and personal data. Extended profiles (IaaS, PaaS, SaaS, Storage) contain the threats of various types of cloud applications.

To use the ACCTP model, you should describe structure of cloud system by a Data Flow Diagram (DFD) with the OWASP Threat Dragon modelling tool, applying the cloud specific labels to items of the diagram. Saved Dragon's JSON file should be used as a source for our OdTMServer application (see details in the instruction). JSON file with a threat model, built by the OdTMServer tool, can be reopen in Threat Dragon for further analysis.

Current list of the cloud specific labels includes:

class#CloudApplication
class#CloudInfrastructure
class#ComplianceManager
class#ExternalService
class#PaaSApplication
class#PrivacyManager
class#RemoteUser
class#SaaSApplication
class#VirtualMachine

To mention the ACCTP model in your publication, please, cite:

Brazhuk A. Threat modeling of cloud systems with ontological security pattern catalog //International Journal of Open Information Technologies. – 2021. – Т. 9. – №. 5. – С. 36-41. fulltext