diamond_fulldiamonddiamond_halfdiamond_eurosearch-iconmenuchat-iconclose-iconenvelope-iconsmartphone-call-icon

Assessment

Threat and Risk Assessment

The high priority given to information technology in the company requires a comprehensive identification and assessment of the associated security risks. So-called threat and risk analysis are an elementary component of IT risk management. On the basis of many years of practical experience, our company supports you in implementing such analyses tailored to your requirements. In general, the implementation of a Threat and Risk Assessment is carried out in accordance with ISO / IEC 27005. If the scope of the assessment is related to the automotive domain (e.g., for the risk assessment of an ECU), our approach is aligned with the requirements of the so-called Threat Analyses and Risk Assessment (TARA) process as defined by ISO/SAE 21434.

placeholder for background/covered-door.jpg

Objective

Assessment of the risk for IT environments or individual components based on defined and developed threat scenarios


Question

What security risks exist for an IT environment or individual components based on given threat scenarios?


Scope

IT environments or individual components

Threat Analysis

The threat analysis is a structured approach for the identification and evaluation of possible IT / OT-based threats related to an IT environment, an IT system or an application. As part of an IT security assessment, the threat analysis enables an auditor to identify relevant threat and attack scenarios for subsequent audits. Furthermore, the threat analysis is the basis for a well-founded risk analysis.

As a result, the well established approach of threat analysis forms the basis for further (technical) assessments and analyses, and achieves a high level of coverage of the real existing threat landscape.

A threat analysis consists of the following components:

  • Workshop, interviews and/or analysis of provided documents
    • Capturing the context
    • Identification of assets (such as information or processes requiring protection)
  • Identification and analysis of specific threat and attack scenarios
  • Definition of next steps
  • Documentation and presentation of results

The threat analysis is based on different methods and standards:

  • IT risk management according to ISO / IEC 27005
  • TARA according to ISO / SAE 21434
  • STRIDE Threat Model
  • OWASP Threat Modeling

The results are the basis for the subsequent risk analysis and offer a basic set of relevant threat and attack scenarios for performing security assessments (e.g. penetration tests).

Risk Analysis

As part of the risk analysis, specific risks for an IT environment, an IT system or an application are assessed on the basis of the previously defined threat scenarios. The ISO / IEC 27005 standard, as part of the ISO 2700X family, describes the process required for this in the form of IT risk management.

A risk analysis consists of the following components:

  • Workshop, interviews and/or analysis of provided documents
    • Capturing existing security controls
    • Capturing basic information of the IT risk management and the information security management system (ISMS) of the customer
  • Identification and assessment of risks regarding:
    • Impact rating
    • Attack path analysis
    • Attack feasibility rating
    • Risk value determination
  • Risk treatment and prioritization
    • Description and mapping of concrete measures
  • Documentation and Presentation of Results

As a result, you will receive a list of the identified security risks together with a well-founded risk assessment and recommendation of possible technical or organizational measures.

How can we help you?

Call us or find your contact person

Free Consultation