<?xml version="1.0" encoding="UTF-8"?>
<TEI xml:space="preserve" xmlns="http://www.tei-c.org/ns/1.0" 
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" 
xsi:schemaLocation="http://www.tei-c.org/ns/1.0 https://raw.githubusercontent.com/kermitt2/grobid/master/grobid-home/schemas/xsd/Grobid.xsd"
 xmlns:xlink="http://www.w3.org/1999/xlink">
	<teiHeader xml:lang="en">
		<fileDesc>
			<titleStmt>
				<title level="a" type="main">Automation of Risk-Based Vulnerability Management Based on a Cyber Kill Chain Model</title>
			</titleStmt>
			<publicationStmt>
				<publisher/>
				<availability status="unknown"><licence/></availability>
			</publicationStmt>
			<sourceDesc>
				<biblStruct>
					<analytic>
						<author>
							<persName><forename type="first">Thomas</forename><surname>Devaux</surname></persName>
							<affiliation key="aff0">
								<orgName type="institution">Thales SIX GTS France</orgName>
								<address>
									<addrLine>4 av. des Louvresses</addrLine>
									<postCode>92230</postCode>
									<settlement>Gennevilliers</settlement>
									<country key="FR">France</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Thomas</forename><surname>Massip</surname></persName>
							<affiliation key="aff0">
								<orgName type="institution">Thales SIX GTS France</orgName>
								<address>
									<addrLine>4 av. des Louvresses</addrLine>
									<postCode>92230</postCode>
									<settlement>Gennevilliers</settlement>
									<country key="FR">France</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Alexis</forename><surname>Ulliac</surname></persName>
							<affiliation key="aff0">
								<orgName type="institution">Thales SIX GTS France</orgName>
								<address>
									<addrLine>4 av. des Louvresses</addrLine>
									<postCode>92230</postCode>
									<settlement>Gennevilliers</settlement>
									<country key="FR">France</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Jean-Luc</forename><surname>Simoni</surname></persName>
							<affiliation key="aff0">
								<orgName type="institution">Thales SIX GTS France</orgName>
								<address>
									<addrLine>4 av. des Louvresses</addrLine>
									<postCode>92230</postCode>
									<settlement>Gennevilliers</settlement>
									<country key="FR">France</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Paul</forename><surname>Varela</surname></persName>
							<affiliation key="aff0">
								<orgName type="institution">Thales SIX GTS France</orgName>
								<address>
									<addrLine>4 av. des Louvresses</addrLine>
									<postCode>92230</postCode>
									<settlement>Gennevilliers</settlement>
									<country key="FR">France</country>
								</address>
							</affiliation>
						</author>
						<author>
							<affiliation key="aff1">
								<orgName type="department">Computer Electronics Security Application Rendezvous</orgName>
								<address>
									<addrLine>November 16-17</addrLine>
									<postCode>2021</postCode>
									<settlement>Rennes</settlement>
									<country key="FR">France</country>
								</address>
							</affiliation>
						</author>
						<title level="a" type="main">Automation of Risk-Based Vulnerability Management Based on a Cyber Kill Chain Model</title>
					</analytic>
					<monogr>
						<imprint>
							<date/>
						</imprint>
					</monogr>
					<idno type="MD5">97CA02A1CFF25D9793AD9410FD7F3398</idno>
				</biblStruct>
			</sourceDesc>
		</fileDesc>
		<encodingDesc>
			<appInfo>
				<application version="0.7.2" ident="GROBID" when="2023-03-24T03:37+0000">
					<desc>GROBID - A machine learning software for extracting information from scholarly documents</desc>
					<ref target="https://github.com/kermitt2/grobid"/>
				</application>
			</appInfo>
		</encodingDesc>
		<profileDesc>
			<textClass>
				<keywords>
					<term>1 Vulnerability Management</term>
					<term>Risk Management</term>
					<term>Compliance</term>
					<term>Automation</term>
					<term>ATT&amp;CK</term>
					<term>CVSS</term>
					<term>cyber kill chain</term>
					<term>Triage</term>
				</keywords>
			</textClass>
			<abstract>
<div xmlns="http://www.tei-c.org/ns/1.0"><p>Risk management and Vulnerability management are both essential cybersecurity domains. They are often managed independently without a proper interface to provide context information to each other's and share information. This paper proposes an approach to connect risk management and vulnerability management processes and provide automation in both ways to help to categorize and sort a large number of vulnerabilities and build operational risk scenarios relevant to the business. A four steps approach presents the process for connecting and adjusting information from Operational Scenario (OpeSce) and Vulnerabilities: STEP 1 Link Operational Scenarios and Vulnerabilities, STEP 2 Re-assessment scoring of the Operational Scenario, STEP 3 Re-assessment scoring of the Vulnerabilities.</p></div>
			</abstract>
		</profileDesc>
	</teiHeader>
	<text xml:lang="en">
		<body>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="1.">Introduction</head><p>The digitalisation and interconnexion of systems are increasing tremendously. The industry is facing a new challenge to manage risks and vulnerabilities at this scale. Systems become more and more complex and can be made of an aggregation of different sub-systems from several suppliers as well as legacy sub-systems. Risk management is done at high system level view when vulnerability management is done using the knowledge of assets at the field and sub systems level.</p><p>The Figure <ref type="figure" target="#fig_0">1</ref> shows this relationship where each sub-system can have its own risk assessment and own way of managing vulnerabilities. Therefore, interconnecting the vulnerability management to a high-level system risk management process can be challenging. This paper proposes an approach to connect risk management and vulnerability management processes and provide automation in both ways to help to categorize and sort a large number of vulnerabilities and build operational risk scenarios relevant to the business.</p><p>In this paper, after the presentation of the problematic and associated challenges ( §2), is presented the vulnerability management ( §3) then risk management ( §4) before presenting the interface between the two activities and how to provide automation to support the security analyst ( §5).</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2.">Problematic</head><p>Risk management and Vulnerability management are both essential cybersecurity domains. Risk management is a framework to identify, evaluate and prioritize risks <ref type="bibr" target="#b0">[1]</ref> from business analysis to identification of risks scenarios. The vulnerabilities management is the process of analysing and sorting vulnerabilities from audits and CSIRT<ref type="foot" target="#foot_1">2</ref> alerts in the most efficient way for treatment.</p><p>They are often managed independently without a proper interface to provide context information to each other and share information.</p><p>In the state of the art, publications have already been done on how to combine risk and vulnerability management. One approach is to try to use CVSS metrics for Information Security Risk Assessment as defined in <ref type="bibr" target="#b1">[2]</ref>. The limit of this approach is the difficulty to establish an exhaustive mapping between all metrics used for vulnerably scoring with risk assessment metrics such as likelihood and impact.</p><p>A second approach is to combine CVSS, attack graphs and the network information to provide parameters to objectively reflects the risk represented by vulnerabilities regarding its network environment by using HIN (Heterogeneous Information Network) as defined in <ref type="bibr" target="#b2">[3]</ref>. This approach provides a proposition of solution to the lack of additional values in CVSS Access Vector parameter (see Figure <ref type="figure" target="#fig_1">3</ref>: CVSS v3.1 Score assessment ) for Vulnerability assessment. It does not address the link with an actual risk management activity.</p><p>In addition, the usage of the Cyber Kill Chain® <ref type="bibr" target="#b5">[5]</ref> (CKC) to organize vulnerabilities has been addressed by ENISA <ref type="bibr" target="#b6">[6]</ref> with the outcome that vulnerabilities are not homogenously represented in the different CKC 3 steps. The advantage of using operational scenarios based on CKC, for vulnerability management, is to answer to attack-graph complexity that is explained in §2.2 bottom-up challenge. The BSI <ref type="bibr" target="#b7">[7]</ref> proposes a mapping between elementary threats and security measures. They estimates <ref type="bibr" target="#b8">[8]</ref> that an effective security baseline can cover up to 80% of basic attacks. Based on the EBIOS Risk Manager approach <ref type="bibr" target="#b9">[9]</ref>, operational scenarios are defined considering the compliance to the security baseline. It means that by mapping the operational scenarios, from risk management activities to vulnerabilities, the implementation of the security baseline and associated security controls is considered. This is not possible using only CVSS metrics following a traditional vulnerability management process. CVSS is not considering the actual security measures implemented.</p><p>A. Kuppa et al. <ref type="bibr" target="#b10">[10]</ref> proposes an approach to match vulnerabilities and techniques of cyber kill chain with Natural Language Processing (NLP) techniques and Multi-Label Text Classification (MLTC) models. The lessons learned from this state-of-the-art analysis is that to avoid to add complexity to both processes, it is required to keep risk management and vulnerability management separated but complementary by defining an interface between them. The approach used by EBIOS Risk Manager with operational scenarios combined with the usage of the CKC for vulnerably organization can be used as an interface to provide automation in order to support the security analyst.</p><p>This publication focuses on proposing means to link Risk and Vulnerability Management activities, which are complementary, while keeping them independents.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2.1.">Top down challenges</head><p>The standard approach to perform a risk assessment is to use a top down approach to define what to protect, against who, what is feared and how it could occur. Top down challenges can be defined as:</p><p>• Architecture granularity: In most cases, the Risk Assessment is based on a High-Level Design (HLD) architecture which does not include the description of all assets (server, network, etc.). The vulnerabilities are assigned on technical assets. However, the link between the technical asset and the "higher level" assets of the Risk Assessment is not straightforward. • Complex system risk assessment mapping: Risk Assessment starts at a high level for complex systems, in order to identify and justify security system requirements. However, as lower level systems can be developed and integrated by various stakeholders (industry, subcontractors, etc.), specific risk assessment can be done locally for sub systems. It is essential to tailor global risk assessment impacts to sub-systems. • Likelihood evaluation: A consequence of the first above challenge is the difficulty to evaluate the likelihood of such risk scenario considering the lack of operational parameters and detail of lower level architecture. The proposition to solve those challenges is to use vulnerabilities to help building risk scenarios using vulnerability management.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2.2.">Bottom-up challenges</head><p>Vulnerability Management through the process of vulnerability disclosure is facing a huge number of vulnerabilities to deal with. It is essential to be able to perform a triage in order to keep only the relevant vulnerabilities for remediation decision by the management. Bottom-up challenge can be defined as:</p><p>• Asset valuation: Audits and penetration testing enable to report Vulnerabilities and Weaknesses (CVE vs CWE). In this situation, it is easy to link vulnerabilities to supporting assets, however, the lack of context with a pre-existing risk assessment makes them difficult to prioritize as it is difficult to define the importance of a supporting asset without the system context. The vulnerability scoring Common Vulnerability Scoring System CVSS version 3.1 <ref type="bibr" target="#b11">[11]</ref>, detailed later in this publication, reflects the challenge of bringing context to a vulnerability regarding the importance of a supporting asset for a system or the organization. Indeed, the CVSS score can be compared to a risk level as it is defined by the combination of the Exploitability and Impact metrics. Nevertheless, at the vulnerability level, only the associated supporting asset is known. All the context such as the importance of the asset regarding its environment and its mission is not known. The CVSS allows to apply a ponderation to the impact metrics regarding the vulnerability environment but at the vulnerability management level it is difficult to have access to such information.</p><p>• Attack-graph complexity: Many publications have been done to explain how to use attackgraph method to represent possible attack paths and associated vulnerabilities as explained in <ref type="bibr" target="#b2">[3]</ref>. However, an issue with this approach is that attack graphs generation implies polynomial complexity and an exponential number of attack paths.</p><p>The proposition to solve these challenges is to use risk scenarios to help in the assessment of a vulnerability (including triage and prioritization).</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2.3.">Problematic of interfacing risk management and vulnerability management</head><p>As shown in Figure <ref type="figure">2</ref>, this publication proposes a way to automatically interface risk management and vulnerability management in order to solve the top down (blue arrows) and bottom up (green arrows) challenges listed above.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Figure 2: Risk and vulnerability management interaction</head><p>The current version of EBIOS Risk Manager <ref type="bibr" target="#b8">[8]</ref> provides a detailed framework to define and describe operational scenarios as per the workshop 4.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.">Vulnerability management 3.1. Vulnerability handling and disclosure</head><p>In order to deal with vulnerabilities, a Vulnerability Management process needs to be defined in the organization. It can be defined as how to process and remediate potential vulnerability information reported by internal or external individuals or organizations.</p><p>ISO (International Standard Organization) provides terms, definitions, concepts and organization propositions to structure this activity through 2 complementary standards:</p><p>• ISO 30111 -Vulnerability handling process <ref type="bibr" target="#b12">[12]</ref>. It deals with the investigation, triage, and remediation of internally or externally reported vulnerabilities. • ISO 29147 -Vulnerability disclosure <ref type="bibr" target="#b13">[13]</ref>. It deals with the interfaces between the different potential vulnerability reporting stakeholders (vendors, audits/penetration testing, etc.).</p><p>Vulnerability management can be defined by the following sub-activities:</p><p>• Vulnerability management policy and organization (Preparation): Development of a Vulnerability management policy, processes and capabilities. This includes the definition of roles and responsibilities such as an internal response team for Vulnerability management (PSIRT/CSIRT).</p><p>• Vulnerability disclosure (Receipt): Interactions with internal/external stakeholders to receive new potential vulnerability report from CVE (Common Vulnerabilities and Exposures)), audits and penetration testing results or security baseline non-compliance.</p><p>• Assessment (Verification): The internal PSIRT/CSIRT proceeds to an initial investigation in order to confirm that the potential vulnerability is applicable to the organization scope. A root cause analysis is then performed to identify the affected supporting assets and the related primary assets (information or processes). The vulnerability is assessed in order to define a prioritization. During the assessment, the importance of the supporting asset affected by the vulnerability can be defined in collaboration with the Chief Information Security Officer who is in charge of the risk management. This can be done by adjusting the Environmental score introduced below in 3.2 in accordance with the supporting asset owner (e.g. CISO).</p><p>• Remediation proposal &amp; Vulnerability treatment (Remediation Development): The decision authority defines the remediation treatment option related to the vulnerability. The remediation is then produced and tested to ensure that the measure is efficient and does not introduce new vulnerabilities.</p><p>• Release (Release &amp; Post Release): The remediation release is deployed on the related supporting assets. The post release ensures the maintenance and monitoring of the remediation.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.2.">Vulnerabilities assessment</head></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Vulnerabilities scoring</head><p>Vulnerabilities can result from different type of inputs but it is important to share the same vulnerability scoring system and criteria in order to be able to make an assessment and prioritization.</p><p>Common Vulnerability Scoring System CVSS version 3.1 <ref type="bibr" target="#b4">[4]</ref> allows to define an overall scoring of a vulnerability based on the following metric groups as defined in Figure <ref type="figure" target="#fig_1">3:</ref> • Basic: intrinsic qualities of a vulnerability that are constant over time and across user environments • Temporal: characteristics of a vulnerability that change over time • Environmental: characteristics of a vulnerability that are unique to a user's environment It is the environmental metrics groups that will allow an organization to reassess the vulnerability overall scoring regarding its own environment (affected primary/supporting assets, etc.). </p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Vulnerability origin types</head><p>Vulnerabilities can be from different origin types and sources:</p><p>• Audits and penetration testing reports: Vulnerabilities can result from security audits and penetration testing findings. Depending on the scope and perimeter and type of audits, such as black box or crystal box, it is possible to identify non-identified vulnerabilities on the system. In order to be able to integrate those results in the vulnerability management process it is important to use the same scoring and metrics to be able to make an assessment using the same criteria.</p><p>Reports from security audits and penetration testing shall present the vulnerabilities identified using the CVSS scoring. Most of the time as the tests are done by external third parties, only the Base and Temporal Metric Group can be fulfilled in this situation.</p><p>• Publicly disclosed vulnerability -CVE: Some vulnerabilities are publicly available. This is the case for CVEs <ref type="bibr" target="#b10">[10]</ref> (Common Vulnerabilities and Exposures) which are computer security flaws, disclosed by CNAs (CVE Numbering Authorities) assigned to a specific CVE ID. Those software based CVE are assessed using the current Common Vulnerability Scoring System CVSS version 3.1 <ref type="bibr" target="#b4">[4]</ref> and can be related to a CPE <ref type="bibr" target="#b14">[14]</ref> (Common Platform Enumeration) which is a structured naming scheme for information technology systems, software, and packages. Those vulnerabilities are the most common to deal with in a vulnerability management process.</p><p>• Non-Compliance -Security baseline: Vulnerabilities can also be expressed as a lack of security measure, or more specifically to a noncompliance to security requirements from the security baseline applicable to the system. The statement of compliance regarding the security requirements can be expressed as Covered/Partially covered / Not covered. Depending on this status it is possible to create a vulnerability issued from the non-compliance using the CVSS scoring.</p><p>In order to be able to use those vulnerabilities in risk scenarios definition, it is needed to use the same scoring metrics (such as CVSS). Further inputs can be found in <ref type="bibr" target="#b6">[6]</ref>Figure <ref type="figure" target="#fig_1">3</ref>.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4.">Risk management 4.1. EBIOS Risk Manager</head><p>As per ISO 27005 <ref type="bibr" target="#b0">[1]</ref> definition, the Information Security Risk Management process is a systematic approach to information security which is necessary to identify organisational need regarding information security requirements and to create an effective Information Security Management System (ISMS) in support to ISO 27001 <ref type="bibr" target="#b15">[15]</ref>.</p><p>Information risk management is a continuous process that enables to keep residual risks at an acceptable level for the organisation.</p><p>In this paper, the EBIOS Risk Manager <ref type="bibr" target="#b9">[9]</ref> methodology is used as an information security risk assessment framework. The segregation of risk scenario into strategic and operational scenarios makes it suitable for this exercise. In this paper, the focus is on operational scenarios and how they can be:</p><p>• Used to build scenarios suitable for vulnerability management (2.1 top down challenge);</p><p>• Built from audit results from vulnerability management process, with limited prior knowledge of the sub-system architecture (2.2 bottom-up challenge).</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4.2.">Operational scenarios definition with Cyber Kill Chain</head><p>Operational scenarios are defined by different attack paths an attacker can realize to trigger a strategic scenario. Attack path are designed with the support of the Cyber Kill Chain® concept <ref type="bibr" target="#b5">[5]</ref>. An attack path is composed of a sequence of steps, each of them composed of a technique (elementary actions also called elementary threats) and supporting asset (on which the technique is applied).</p><p>Various implementation of Cyber Kill Chain® knowledge base exists, the most well-known are the ATT&amp;CK MITRE <ref type="bibr" target="#b11">[11]</ref> or the Attack Kill Chain from Microsoft <ref type="bibr" target="#b16">[16]</ref>.</p><p>Figure <ref type="figure">5</ref>: Simplified Cyber Kill Chain® <ref type="bibr" target="#b9">[9]</ref> In this paper, a simplified kill chain (proposed in EBIOS RM <ref type="bibr" target="#b9">[9]</ref>) is used and composed of the following tactics in Figure <ref type="figure">5:</ref> 1. Knowing: gather information on the targeted system (OSINT, Intelligence, etc.);</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Supporting asset A Supporting asset B Supporting asset C Supporting asset D Supporting Assets</head><p>2. Entering: Find a way to enter into the targeted system (social engineering, USB key, fishing, existing channel, etc.); 3. Finding: recognition of internal assets and lateralization; 4. Exploiting: Exploitation of a malicious payload, maintaining on the system and exfiltration of the data. The kill chain helps to understand the operational scenarios, by exploiting vulnerabilities to implement techniques on supporting assets and how to prevent it by interrupting it as soon as possible. Being able to identify the most likely paths of an attacker to reach its target objective is mandatory in order to identify where to breach for a greater efficiency to lower the risks at reasonable cost.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="5.">Interface between top-down and bottom-up challenges 5.1. General overview</head><p>The Figure <ref type="figure">6</ref> below presents the proposed STEPs for connecting and adjusting information from Operational Scenario (OpeSce) and Vulnerabilities.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Figure 6: STEPS for connecting and adjusting information form Operational Scenario and Vulnerabilities</head><p>STEP 1 aims at establishing a link between OpeSce and Vulnerabilities. The objective is to define, for each vulnerability, on which attack path step (combination of a supporting asset and a technique) to associated it in an OpeSce. This can be done using different methods (manually, computer aided or fully automated). In this paper, the focus is done on the first 2 methods. STEP 2 and STEP 3 are then to reassess the likelihood of the OpeSce and the CVSS scoring of the Vulnerability linked to OpeSce. The objective is to define if the new link has an influence on the valuation of the OpeSce and associated Vulnerabilities.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="5.2.">STEP 1: Link Operational Scenarios and Vulnerabilities</head><p>The objective of this STEP is to establish a link between vulnerabilities and the attack path step (combination of supporting asset and technique) of an OpeSce. The following scheme gives an overview of the method to realise this STEP.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>1</head><p>• Link Operational Scenarios and Vulnerabilities Vulnerability (a)</p><p>Step of an Attack Path (b)</p><p>Functions Referential</p><p>(1)</p><p>(2)</p><p>(3) ( <ref type="formula">4</ref>)</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Free text description</head><p>Step of an Attack Path Vulnerability For a Vulnerability (a) (see Figure <ref type="figure" target="#fig_3">7</ref>) the following attributes can be identified:</p><p>• Supporting asset;</p><p>• Description (of the vulnerability and how it can be exploited): Scoring like CVSS calculated in §3.2. An OpeSce can contain one or several attack paths. For every steps of an attack path (b) (see Figure <ref type="figure" target="#fig_3">7</ref>) a free text description can be provided as no specific format has been adopted yet by the community. From that description the following information can be extracted and can be seen as attributes:</p><p>• Supporting asset function targeted by the attack;</p><p>• Technique used to do the attack. 2 attributes are being used in order to connect these 2 objects (Vulnerability and a step of an attack path):</p><p>• Technique (green in the figure);</p><p>• Function (blue in the figure). On the general basis, theses 2 attributes are provided as a free text. The description does not follow any specific rules of writing or common referential. The objective is to propose multiple solutions for matching the 2 attributes.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Link the technique attribute</head><p>In order to link the "Technique" attribute, a referential as a way of establishing a common language is used. Such a referential can be e.g. ATT&amp;CK matrix <ref type="bibr" target="#b17">[17]</ref> or elementary threats from the BSI <ref type="bibr" target="#b7">[7]</ref>.</p><p>From Figure <ref type="figure" target="#fig_3">7</ref>, in order to link the (1) and (2), multiple solutions exist, from manual to Assisted linkage:</p><p>1. The manual technique consists in the use of human knowledge. a. When describing a step of an attack path or a vulnerability referential of techniques shall be used. b. If it is not possible to categorize the description when producing the initial document then it can be done manually after. This is a very fastidious and time-consuming task. 2. Assisted linkage: It is a method based on texts alignment. The referential descriptions are inserted in a search engine. Using the Vulnerability description, as a question, the search engine ranks the possible techniques. Once validated by a human the Vulnerability description can be inserted in the technique description in the search engine. This feedback loop starts to build a knowledge base and so improve the search engine results. Same process is done for the description of a step of an attack path (2) in Figure <ref type="figure" target="#fig_3">7</ref>. Our results on linking the technique attribute are not homogenous and are very similar to the one in ENISA source <ref type="bibr" target="#b6">[6]</ref>).</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Link the function attribute</head><p>The link on "function attribute", it is now necessary to determine if the Vulnerability is impacting the function defined in the OpeSce. To establish this connection, we will rely on the logical architecture in the architecture document. This document describes with a top down approach and break the service into functions (and sub functions).</p><p>In the case of link (3) in Figure <ref type="figure">6</ref>, the architecture document will help associating a supporting asset, linked to a vulnerability, to a supporting asset function.</p><p>For the link (4) in Figure <ref type="figure" target="#fig_3">7</ref>, the function is associated to a function in the architecture document. And using the break down function the Vulnerability and the OpeSce step of attack path are connected.</p><p>This association can be done using similar technique as the one used for the technique attribute ie manually by a system engineer, or automated by using a database associating a supporting asset to its functions.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Automation based on non-compliance</head><p>As defined in 3.2, a vulnerability can have 3 origin types.</p><p>In case of non-compliance to the security baseline, it is possible to use the mapping from <ref type="bibr" target="#b7">[7]</ref> to identify an elementary threat based on its related security control. This allows to automatically identify a technique (represented by an elementary threat using <ref type="bibr" target="#b7">[7]</ref> wording) to an operational scenario based on a new vulnerability which is a non-compliance to a security control from the security baseline.</p><p>Using this approach allows to trigger updates of the associated attack paths and the risk assessment associated.</p><p>The limitation of the mapping proposed by <ref type="bibr" target="#b7">[7]</ref> is that it requires an additional work to map each elementary threat to a tactic (step of the CKC) as defined in 4.2.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="5.3.">STEP 2: Re-assessment scoring of the Operational Scenario</head><p>Once some vulnerabilities have been linked to Operational scenarios, a process of likelihood assessment can start. The purpose is, knowing the existing associated vulnerabilities: does an attacker have more chance of reaching the objective?</p><p>Depending on the solution used to calculate the likelihood in the risk management process, the same solution needs to be replayed again for the re-assessment, this is in order to keep consistency. If the likelihood given to a scenario is validated by the management based on the experience of the security experts. For the re-assessment, this process needs to be replayed. The security experts will be gathered and their judgement will be used to re-evaluate the likelihood.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="5.4.">STEP 3: Re-assessment scoring of the vulnerabilities</head><p>In this step the objective is to re-assess the scoring of a vulnerability considering the information from the OpeSce. The gravity inherited by the OpeSce (through a strategic scenario) is used to prioritize the vulnerabilities remediation.</p><p>It is proposed to adjust the vulnerability scoring (defined in §3.2) by reflecting the gravity in the Environmental Metric Group. If a vulnerability is attached to multiple OpeSce then the max value of all gravity is taken.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="6.">Use case</head><p>This section is based on a Use Case that presents more concretely the proposed methodology. The Use Case is the following: A risk assessment has been already conducted. The system is in development phase and a penetration testing (pentest) has been conducted. The objective is then to assess how the vulnerabilities found during the pentest can affect Operational Scenarios. The data for the Operational Scenario and network architecture is part of the EBIOS RM training book <ref type="bibr" target="#b18">[18]</ref>.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="6.1.">Operational scenario (OpeSce)</head><p>This operational scenario describes a direct attack to the system in order to steal information. For the description of each step of the attack path, there are a technique used (in black) and an asset (in red).  In order to be in a computational format, operational scenarios must be stored in an electronic format. They are saved in a database using the data model below (a simplified view). </p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="6.2.">Network architecture</head><p>This Network architecture describes the Information System of the example in Figure <ref type="figure" target="#fig_7">10</ref>. In order to represent our architecture network in a computational format the concept of "CMDB" is used <ref type="bibr" target="#b19">[19]</ref>. The CMDB model is made of different layers hardware, system, data, application, Service. The service layer contains entities to describe technical services (functions) and business services. The list of technical Service/Functions depends heavily on the modelling of the CMDB. In this example, "office Network" should not be seen just as a network but as a set of supporting assets that offer the technical service "office network". </p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="6.3.">Vulnerabilities</head><p>A list of vulnerabilities is built from several sources. For instance, the following vulnerabilities from Figure <ref type="figure" target="#fig_9">12</ref>: Example list of vulnerabilities are identified as gathered from a pentest on the system. </p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="6.1.">STEP 1: Link Operational Scenarios and Vulnerabilities</head><p>The vulnerability PT16 from Figure <ref type="figure" target="#fig_9">12</ref>, is used as an example in this step.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Identify the technique attribute</head><p>Using the description of PT16, it is needed to identify the associated techniques and the tactics. For that, the text search engine of the database (DB) is used (Figure <ref type="figure" target="#fig_10">13</ref>). The DB proposes a list of possible techniques with associated tactic (Figure <ref type="figure" target="#fig_11">14</ref>).  </p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Identify the functional attribute</head><p>For the PT16 vulnerability, a query is conducted in the CMDB for asset/Configuration Item from the CMDB PC1-HR. The DB query return a set of technical services to retain.</p><p>• "Office network"</p><p>• "SGTIN network" Identifying the steps of the Operational Scenario.</p><p>Once we have identified the Technique attribute and the technical service/functional attribute of a vulnerability a query can be built in order to retrieve the steps of Operational scenarios. </p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="6.2.">STEP 2: Re-assessment scoring of the Operational Scenario</head><p>The step 2.2 of the attack path is impacted by the vulnerability PT16. This scenario with the all identified vulnerabilities are then presented to security experts who will re-evaluate the likelihood of the scenario. In our case, has the vulnerability taken as example is impacting a enter tactic the likelihood could increase.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="7.">Conclusion</head><p>This paper proposes an interface for both processes of risk management and vulnerability management. It presents information flows that can be exchanged between operational scenarios and vulnerabilities and a proposition of format for operational scenarios description allowing automation</p><p>In order to interface those processes, two challenges have been identified (top-down approach challenge §2.1 and bottom up challenge §2.2) in order to exchange information.</p><p>The described approach has been set up and is used operationally. It is partially automated and areas of improvement have been identified. The main problem faced is the lake of consistency in description of Operational Scenarios and the description of vulnerabilities. That is why an emphasis on using referential (CMDB) and MITRE ATT&amp;CK are important. The other challenge is to improve the accuracy of the CMDB (have all elements of the network architecture) and a description at technical service level.</p></div><figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_0"><head>Figure 1 :</head><label>1</label><figDesc>Figure 1: Risk management vs. Vulnerability management for system of systems</figDesc><graphic coords="1,215.68,479.67,163.63,141.80" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_1"><head>Figure 3 :</head><label>3</label><figDesc>Figure 3: CVSS v3.1 Score assessment<ref type="bibr" target="#b4">[4]</ref> </figDesc><graphic coords="5,107.00,506.94,380.31,177.85" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_2"><head>Figure 4 :</head><label>4</label><figDesc>Figure 4: EBIOS Risk Manager Workshops</figDesc><graphic coords="7,142.90,71.85,309.18,176.05" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_3"><head>Figure 7 :</head><label>7</label><figDesc>Figure 7: Solution to link OpeSce and vulnerabilities based on attributes</figDesc><graphic coords="9,98.29,220.72,366.61,81.38" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_5"><head>Figure 8 :</head><label>8</label><figDesc>Figure 8: Example Operational Scenario</figDesc><graphic coords="11,121.25,612.22,351.85,151.45" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_6"><head>Figure 9 :</head><label>9</label><figDesc>Figure 9: OpeSce Data model</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_7"><head>Figure 10 :</head><label>10</label><figDesc>Figure 10: Example network architecture</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_8"><head>Figure 11 :</head><label>11</label><figDesc>Figure 11: CMDB modelling of the architecture network</figDesc><graphic coords="12,126.75,395.59,341.47,186.60" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_9"><head>Figure 12 :</head><label>12</label><figDesc>Figure 12: Example list of vulnerabilities</figDesc><graphic coords="13,112.55,71.85,372.61,307.55" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_10"><head>Figure 13 :</head><label>13</label><figDesc>Figure 13: Example Vulnerability search box</figDesc><graphic coords="13,147.50,533.60,300.00,66.00" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_11"><head>Figure 14 :</head><label>14</label><figDesc>Figure 14: Example Proposition of list of techniques</figDesc><graphic coords="14,126.35,71.85,342.30,237.50" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_12"><head>Figure 15 :</head><label>15</label><figDesc>Figure 15: Example Technical services</figDesc><graphic coords="14,184.90,432.69,225.20,191.25" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_13"><head>Figure 16 :</head><label>16</label><figDesc>Figure 16: Example match between vulnerability and Operational Scenario</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0"><head></head><label></label><figDesc></figDesc><graphic coords="4,170.30,157.98,254.40,225.00" type="bitmap" /></figure>
			<note xmlns="http://www.tei-c.org/ns/1.0" place="foot" xml:id="foot_0">Proceedings of the 28 th C&amp;ESAR (2021)</note>
			<note xmlns="http://www.tei-c.org/ns/1.0" place="foot" n="2" xml:id="foot_1">Computer Security Incident Response Team</note>
			<note xmlns="http://www.tei-c.org/ns/1.0" place="foot" xml:id="foot_2">Proceedings of the 28 th C&amp;ESAR (2021)</note>
		</body>
		<back>
			<div type="references">

				<listBibl>

<biblStruct xml:id="b0">
	<monogr>
		<idno>I. 27005</idno>
		<title level="m">ISO 27005 -Information technology -Security techniques -Information Security Risk management</title>
				<imprint>
			<publisher>International Standard Organization</publisher>
			<date type="published" when="2018">2018</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b1">
	<analytic>
		<title level="a" type="main">A Quantitative CVSS-Based Cyber Security Risk</title>
		<author>
			<persName><forename type="first">M</forename><forename type="middle">U</forename><surname>Aksu</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><forename type="middle">H</forename><surname>Dilek</surname></persName>
		</author>
		<author>
			<persName><forename type="first">E</forename><forename type="middle">I</forename><surname>Tatli</surname></persName>
		</author>
		<author>
			<persName><forename type="first">K</forename><surname>Bicakci</surname></persName>
		</author>
		<author>
			<persName><forename type="first">H</forename><forename type="middle">I</forename><surname>Dirik</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><forename type="middle">U</forename><surname>Demirezen</surname></persName>
		</author>
		<author>
			<persName><forename type="first">T</forename><surname>Aykır</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">2017 International Carnahan Conference on Security Technology (ICCST)</title>
				<meeting><address><addrLine>Madrid, Spain</addrLine></address></meeting>
		<imprint>
			<date type="published" when="2017-10">Oct. 2017</date>
			<biblScope unit="page" from="23" to="26" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b2">
	<monogr>
		<title/>
		<author>
			<persName><forename type="first">Wenrui</forename><surname>Wang</surname></persName>
		</author>
		<imprint/>
	</monogr>
</biblStruct>

<biblStruct xml:id="b3">
	<analytic>
		<title level="a" type="main">A Vulnerability Risk Assessment Method Based in Heterogeneous Information Network</title>
		<author>
			<persName><forename type="first">Fan</forename><surname>Shi</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Min</forename><surname>Zhang</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Chenxi</forename><surname>Xu</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Jinghua</forename><surname>Zhend</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">IEEE</title>
		<imprint>
			<date type="published" when="2020-08-10">10/08/2020</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b4">
	<analytic>
		<author>
			<persName><surname>First</surname></persName>
		</author>
		<ptr target="https://www.first.org/cvss/v3-1/" />
	</analytic>
	<monogr>
		<title level="m">Common Vulnerability Scoring System Version 3.1</title>
				<imprint>
			<date type="published" when="2021-05-05">5 May 2021</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b5">
	<monogr>
		<title level="m" type="main">The Cyber Kill Chain</title>
		<author>
			<persName><forename type="first">L</forename><surname>Martin</surname></persName>
		</author>
		<ptr target="https://www.lockheedmartin.com/en-us/capabilities/cyber/cyber-kill-chain.html" />
		<imprint>
			<date type="published" when="2021-05-31">31th May 2021</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b6">
	<monogr>
		<author>
			<persName><surname>Enisa</surname></persName>
		</author>
		<title level="m">State of Vulnerabilities 2018/2019</title>
				<imprint>
			<publisher>ENISA</publisher>
			<date type="published" when="2019-12">December 2019</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b7">
	<monogr>
		<title level="m">IT-Grundschutz-Kompendium</title>
				<meeting><address><addrLine>Bonn, Germany</addrLine></address></meeting>
		<imprint>
			<date type="published" when="2021-02">Feb. 2021</date>
		</imprint>
		<respStmt>
			<orgName>BSI ; Federal Office for Information Security (BSI)</orgName>
		</respStmt>
	</monogr>
</biblStruct>

<biblStruct xml:id="b8">
	<analytic>
	</analytic>
	<monogr>
		<title level="m">BSI Standard 100-2</title>
		<title level="s">IT-Grundschutz Methodology</title>
		<meeting><address><addrLine>Bonn</addrLine></address></meeting>
		<imprint>
			<publisher>Bundesamt für Sicherheit in der Informationstechnik (BSI</publisher>
			<date type="published" when="2008">2008</date>
			<biblScope unit="page">93</biblScope>
		</imprint>
	</monogr>
	<note>2.0 ed</note>
</biblStruct>

<biblStruct xml:id="b9">
	<monogr>
		<author>
			<persName><surname>Anssi</surname></persName>
		</author>
		<title level="m">EBIOS Risk Manager, version 1.1</title>
				<meeting><address><addrLine>Paris</addrLine></address></meeting>
		<imprint>
			<publisher>Agence Nationale de la Sécurité des Systèmes d&apos;Information</publisher>
			<date type="published" when="2018">2018</date>
			<biblScope unit="page">49</biblScope>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b10">
	<monogr>
		<title level="m" type="main">Linking CVE&apos;s to MITRE ATT&amp;CK Techniques</title>
		<author>
			<persName><forename type="first">A</forename><surname>Kuppa</surname></persName>
		</author>
		<author>
			<persName><forename type="first">L</forename><surname>Aouad</surname></persName>
		</author>
		<author>
			<persName><forename type="first">N.-A</forename><surname>Le-Khac</surname></persName>
		</author>
		<imprint>
			<date type="published" when="2021">2021</date>
			<publisher>ARES</publisher>
			<pubPlace>Vienna</pubPlace>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b11">
	<monogr>
		<title level="m" type="main">CVE MITRE</title>
		<author>
			<persName><surname>Mitre</surname></persName>
		</author>
		<ptr target="https://cve.mitre.org/" />
		<imprint>
			<date type="published" when="2021-05-05">5 May 2021</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b12">
	<monogr>
		<idno>ISO 30111</idno>
		<title level="m">Information technology -Security techniques -Vulnerability handling</title>
				<imprint>
			<publisher>International Standard Organization</publisher>
			<date type="published" when="2020">2020</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b13">
	<monogr>
		<idno>ISO 29147</idno>
		<title level="m">Information technology -Security techniques -Vulnerability disclosure</title>
				<imprint>
			<publisher>International Standard Organization</publisher>
			<date type="published" when="2020">2020</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b14">
	<analytic>
		<title level="a" type="main">Official Common Platform Enumeration (CPE) Dictionary</title>
		<ptr target="https://nvd.nist.gov/products/cpe" />
	</analytic>
	<monogr>
		<title level="j">NVD</title>
		<imprint>
			<date type="published" when="2021-05-05">5 May 2021</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b15">
	<monogr>
		<idno>I. 27001</idno>
		<title level="m">Information Technology -Security techniques -Information Security Management Systems -Requirements</title>
				<imprint>
			<publisher>International Standard Organization</publisher>
			<date type="published" when="2013">2013</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b16">
	<monogr>
		<title level="m" type="main">Disrupting the kill chain</title>
		<ptr target="https://www.microsoft.com/security/blog/2016/11/28/disrupting-the-kill-chain/" />
		<imprint>
			<biblScope unit="volume">28</biblScope>
			<biblScope unit="page" from="11" to="2016" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b17">
	<monogr>
		<title level="m" type="main">ATT&amp;CK Enterprise Matrix</title>
		<author>
			<persName><surname>Mitre</surname></persName>
		</author>
		<ptr target="https://attack.mitre.org/matrices/enterprise/" />
		<imprint>
			<biblScope unit="volume">29</biblScope>
			<biblScope unit="page" from="4" to="2021" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b18">
	<monogr>
		<title/>
		<author>
			<persName><forename type="first">Formation</forename><surname>Anssi</surname></persName>
		</author>
		<author>
			<persName><surname>Ebios</surname></persName>
		</author>
		<author>
			<persName><surname>Manager</surname></persName>
		</author>
		<imprint>
			<date type="published" when="2021">2021</date>
			<pubPlace>Paris</pubPlace>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b19">
	<monogr>
		<author>
			<persName><forename type="first">O</forename><forename type="middle">O G</forename><surname>Commerce</surname></persName>
		</author>
		<title level="m">ITIL v3 Service Transition Book</title>
				<imprint>
			<publisher>The Stationery Office</publisher>
			<date type="published" when="2007">2007</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b20">
	<monogr>
		<title level="m" type="main">Glossary -Vulnerability Management</title>
		<ptr target="https://csrc.nist.gov/glossary/term/Vulnerability_Management#:~:text=Definition(s)%3A,extend%20compromise%20to%20the%20network" />
		<imprint>
			<date type="published" when="2021-05-31">31th May 2021</date>
		</imprint>
		<respStmt>
			<orgName>NIST</orgName>
		</respStmt>
	</monogr>
</biblStruct>

<biblStruct xml:id="b21">
	<monogr>
		<title level="m" type="main">List of Potential Improvements for CVSS</title>
		<author>
			<persName><surname>First</surname></persName>
		</author>
		<ptr target="https://docs.google.com/document/d/1qmmk9TQulW9d1cuipu_ziXDX0pUswbZ1WSQyynHbvKU/edit#heading=h.ynfuvu3y72hy" />
		<imprint>
			<date type="published" when="2021-09-11">11 September 2021</date>
			<biblScope unit="volume">0</biblScope>
		</imprint>
	</monogr>
</biblStruct>

				</listBibl>
			</div>
		</back>
	</text>
</TEI>
