<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Introducing model-based tool support for applying zero-trust security for microservices at a bank</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Donald Baldwin</string-name>
          <email>don.baldwin@dsv.su.se</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Martin Henkel</string-name>
          <email>martinh@dsv.su.se</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Erik Perjons</string-name>
          <email>perjons@dsv.su.se</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Stockholm University</institution>
          ,
          <addr-line>Borgarfjordsgatan 12, 164 25 Kista</addr-line>
          ,
          <country country="SE">Sweden</country>
        </aff>
      </contrib-group>
      <abstract>
        <p>Zero-trust security involves designing, coding, and deploying applications, assuming that threats may exist both inside and outside the application environment. Developing applications using a zero-trust design is complex since it requires internal development teams to understand and apply zero-trust principles throughout the development process. This is especially crucial for microservice architectures, where many independent teams develop services. However, enforcing and teaching security principles may lead to a formal process, focusing on documentation and auditing rather than agile development. In this paper, we describe a pragmatic use of a modeling tool that is tied to a knowledge repository and contains means for team communication. The tool supports a systemic way of developing zero-trust architectures, catering to both programming needs and the desire to improve the overall development process. The paper concludes with lessons learned from a bank case study where the tool has been developed and utilised for microservices development.</p>
      </abstract>
      <kwd-group>
        <kwd>eol&gt;Zero-trust architecture</kwd>
        <kwd>Modeling tool</kwd>
        <kwd>STRIDE analysis</kwd>
        <kwd>VSM 1</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>1. Introduction</title>
      <p>
        In the domain of cybersecurity, applying zero-trust (ZT) principles marks a paradigm shift from
the traditional perimeter-centric security models to a more holistic, omnipresent security.
Traditional perimeter-centric security is a data security strategy that focuses on protecting the
outer boundaries of a network. The idea is to establish a strong “perimeter” around the network
to prevent unauthorised access and external attacks. Using ZT principles, on the other hand,
operates on the principle that trust is an omnipresent vulnerability [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ]; hence, no distinction is
made between internal and external threats. This approach necessitates continuous verification
of identity, and other contextual factors before granting access to resources [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ].
      </p>
      <p>The need for ZT stems from an increasing sophistication of cyber threats and the recognition
that breaches often occur due to the exploitation of overly trusted networks and systems. This is
especially critical in distributed architectures, such as architecture using microservices, where
the security of each discrete service is important to prevent a domino effect of vulnerabilities.</p>
      <p>The adoption of ZT principles necessitates a departure from conventional security
approaches, particularly in the development and management of systems. It demands not only a
technical reconfiguration but also a comprehensive understanding of its principles across the
organisation’s teams. A major challenge that organisations face in this regard is the dichotomy
between heavy formal security processes and the agility required by development teams. Formal
processes, with their exhaustive checklists and protocols, are perceived as burdensome,
prompting teams to engage in informal practices that, while expedient, inadvertently circumvent
established security measures. Thus, the problem addressed in this paper is the challenge to
support the adoption of ZT principles within teams used to traditional security approaches while
using agile development approaches.</p>
      <p>In the paper we examine a solution in the form of a modeling tool that allows the modeling of
microservices and their associated threats, but also provides features for communication and
process support that allows the teams to develop knowledge about security principles. The tool
is based on Data Flow Diagrams and STRIDE analysis. In this paper, our focus is mostly on how
the tool is situated in an organisation that is using it, rather than the syntax of the used diagram.
While the modeling tool contains basic modeling features, it has some features that make it
especially suited for ZT microservices architectures. For example, the collaborative features of
the tools enable scaling across multiple development teams, which is essential for supporting
microservices architectures. Moreover the tool also contains a component library - making
sharing and pushing for ZT design principles among teams possible. Thus the tool’s benefits lie
only partially in the core modeling support, equal importance is in the organisation support.</p>
      <p>
        We examine how the tool supports the organisation by recognising the organisation as an
organic entity, akin to a living organism, which requires a balance between its operational
functions and strategic imperatives. Inspired by the Viable System Model (VSM) [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ], our method
underscores the importance of systemic thinking. VSM is an approach that views an organisation
as an organism, encompassing both the tactical day-to-day operations and the overarching
strategic vision. It advocates for a symbiotic relationship where different teams work in concert,
ensuring the security integrity of the organisation at every level. We use VSM to analyse the
potential effect of using the modeling tool.
      </p>
      <p>The paper is structured as follows. The main concepts and related research is introduced in
section 2. Section 3 covers the research approach. Section 4 is devoted to describing the case
company, the tool features, and lessons learned from applying the tool. In section 5 we analyse
based on VSM - how the tools helps the organisation.</p>
    </sec>
    <sec id="sec-2">
      <title>2. Background</title>
      <p>Even though ZTA is fairly new concepts for protecting IT systems, there are ample amounts of
papers that describe its technical implementation, but far less that describe how to use models
to shift an organisation’s way of working to build systems using ZT principles.</p>
      <p>
        Technical implementations to uphold ZTA include measures such as continuous verification
[
        <xref ref-type="bibr" rid="ref4">4</xref>
        ] and monitoring to ensure that security policies are upheld [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ]. Even when discussing
technical means for ZTA implementation, there has been a discussion about the effort needed for
shifting to ZTA, mentioning both the cost for tools [
        <xref ref-type="bibr" rid="ref5">5</xref>
        ] and the analysis needed before migrating
[
        <xref ref-type="bibr" rid="ref6">6</xref>
        ]. The migration to ZTA entails 1) identification of current resources (IT systems), 2) risk
assessment and prioritisation, and 3) deployment and review [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ]. The modeling tool presented
in this paper supports the three steps - identification and description of resources, risk
assessment, and security reviews. However, there is currently no support for real-time
monitoring.
      </p>
      <p>
        Modeling as a way to understand and take security measures can be undertaken in several
ways. One way is to make use of an existing modeling framework. For example, the TOGAF
framework may be used for security analysis [
        <xref ref-type="bibr" rid="ref7">7</xref>
        ]. While this has the benefit of using a well-known
model and/or method as a foundation, there is a risk of obscuring the problem at hand—dealing
with security. Another approach is to use tailor-made models for security. For example, the
CORAS model focuses on modeling risk by creating relations between risks and harmful
outcomes [
        <xref ref-type="bibr" rid="ref8">8</xref>
        ]. CORAS models are similar to goal models in that they convey a cause-effect view
of actions taken. Another example of a tailor-made model is the Microsoft Threat Model tool [
        <xref ref-type="bibr" rid="ref9">9</xref>
        ].
The threat modeler uses the same basic concepts employed in the tool presented in this paper
its foundation is the architecture of the system modeled as data flows. While the tool presented
in this paper also uses data flow diagrams (DFDs), it has some additional features that set it apart
from the Microsoft Threat Modeler. Most prominently, it includes a component library, making
it easier to get started with. Moreover, it also has team collaboration features, which are essential
for continuously using the tool and keeping the models and software updated.
      </p>
    </sec>
    <sec id="sec-3">
      <title>3. Research methodology</title>
      <p>
        This study employs a Design Science Research (DSR) [
        <xref ref-type="bibr" rid="ref10">10</xref>
        ] methodology, which involves the
creation and evaluation of artefacts designed to solve identified organisational problems. The
DSR approach ensures the practical relevance of the solution and its contribution to the
knowledge base for both research and general practice. In this paper, our focus is on the
demonstration part of Design Science Research. Specifically, we present the application of the
modeling tool and share the lessons learned from its application. We base these lessons learned
from first-hand experience working in the case organisation, and an interview with personnel
using and developing the tool within the case organisation.
      </p>
    </sec>
    <sec id="sec-4">
      <title>4. Case study at a bank</title>
      <p>The modeling tool has been deployed at a multinational bank, which is offering online payment
solutions to other businesses (B2B). The bank distinguishes itself by providing a wide array of
software deployment options tailored to its clients’ needs. Operating in a highly regulated
financial sector, the bank is committed to stringent compliance with relevant financial
regulations and security standards. This commitment ensures the integrity and reliability of its
services and is crucial for upholding trust among its business clients. The bank’s adherence to
these regulatory requirements is integral to its operations, as it needs to handle the complexities
of providing secure, efficient, and compliant payment solutions in a global marketplace.</p>
      <p>The work with the bank’s software solutions is divided into several types of teams. A team
typically consists of 8 to 12 team members. Each team is using the modeling tool to support their
work, or in the case of the architecture team, has the potential to use it:
•
•
•
•</p>
      <p>The security team is conducting modeling, audits and reviews. The team uses the tool as
a base for modeling, auditing, and reviewing security functions before and during the
development of microservices.</p>
      <p>Security team for penetration testing. The team is using the tool to gain insight into the
vulnerabilities of the microservices, which helps the team take action to improve their
security posture.</p>
      <p>Development teams model, design and document the security functions of the microservices.
The teams are using the tool to model, design and document new microservices and the
maintenance of existing services, including security functions.</p>
      <p>The architecture team describes business cases and designs the overall solution. The team
plays the role of mediator between the business and development teams. So far, the team
has not used the tool. However, the current plan is that the architects in the future could
use the tool for architecture auditing of the microservices.</p>
      <p>When the tool was introduced, it was used solely by the security team to model, audit and
review the microservices and their security functions. However, the use now, when the tool is
fully introduced, is that the development teams use the tool to create models of the microservices
and their security functions, and then the security team uses the model as a foundation for the
auditing and reviews. Hence, as will be discussed in Section 5, the tool is now much more
integrated with the organisation.</p>
      <sec id="sec-4-1">
        <title>4.1. Description of the tool</title>
        <p>The tool is designed to assist in conducting a thorough security STRIDE threat analysis, a key
component in identifying and mitigating potential security threats in system design. It is open
source (Apache License), built with TypeScript, using a Postgres database, Node.js webserver
React front-end. The tool is composed of several modules and functions that facilitate a
modelbased and partially automated security assessment.
In practice, users begin by employing the modeling function to draft a data flow diagram (DFD),
which maps the flow of data and identifies critical processes within the microservices to be
constructed. Concurrently, users leverage the library of components. The library contains
various elements such as cloud services, open-source libraries, and organisational-specific
components. Each component is accompanied by a dedicated STRIDE threat analysis, ensuring
that potential vulnerabilities are not overlooked. The areas covered by STRIDE are Spoofing,
Tampering, Repudiation, Information disclosure, Denial of service, and Elevation of privilege,
and are a common way of identifying IT security threats.</p>
        <p>Given the DFD, the tool performs a partially automated STRIDE analysis. This process
generates a list of identified threats based on the employed components. The tool then proposes
mitigation strategies to be integrated into the system’s design and deployment. The mitigation
strategies are denoted as Controls. To ensure comprehensive coverage, the analysis is
supplemented by a manual STRIDE review for custom-made components, enabling the
combined analysis of both custom-made and off-the-shelf software components.</p>
        <p>When a first draft of the model and analysis has been done, it can be sent for review. The
review process begins with an architect/developer marking a model for review, initiating a
collaborative platform for direct communication between security reviewers, architects, and
developers. This collaborative approach ensures a unified understanding of security threats and
mitigation strategies in the form of available controls. Key to the collaborative process is the
setting of action items, where specific tasks are assigned to address identified threats, enhancing
accountability and ensuring effective implementation of security measures.</p>
        <p>Additionally, the tool supports follow-up reviews, allowing for the verification of completed
action items and the documentation of changes, crucial for maintaining security. A notification
system complements this process by sending email alerts about significant events like review
initiation, action item assignments, and task completions. This ensures all stakeholders are
informed and can respond promptly, fostering continuous engagement with the security
improvement process.</p>
        <p>In the following, we describe the main modules of the tool.
Modeler for Data Flow Diagrams (DFDs): This module enables users to visually represent and
analyse the flow of data within their systems. It’s crucial for understanding how data moves and
where vulnerabilities may exist. DFDs use standardised symbols to represent the flow of data
within a system, highlighting where information is processed and stored (see Figure 2). The
primary graphical elements include: External entities that are external sources of data
(rectangles), Processes functions or activities that transform data (ovals), Data stores
repositories where data is held (two parallel lines), and Data flows depicting the movement or
transfer of data (arrows). These elements work together to provide a visual understanding of
the system’s data handling, facilitating analysis and design.</p>
        <p>Library of Components: The tool includes a library of components and services that can be
used within the organisation. This library encompasses infrastructure/platform elements like
AWS services, open-source libraries such as Docker, and reusable components developed
internally. A component is referred to as a technology stack. Each Process and Data store can be
associated with several components. For example, a service can be build using both using Java
(one component) and run on Apache (another component). An example of components can be
seen on the left hand side of Figure 2.</p>
        <p>STRIDE Analysis: The tool provides STRIDE analysis functions. This feature is instrumental
in identifying and assessing potential security threats in six key areas: Spoofing, Tampering,
Repudiation, Information Disclosure, Denial of Service, and Elevation of Privilege. The STRIDE
analysis could be both manual and automatic:</p>
        <p>Automated Analysis: Based on the DFD model and the included component names, the tool
can automatically generate a list of identified threats, assess their risks, and suggest mitigation
strategies. For example, if a PostGreSQL database is used, the tool will suggest SQL injection as a
threat (Figure 3).</p>
        <p>Manual Analysis Support: For custom-made components in a project, the tool supports a
manual STRIDE analysis, ensuring comprehensive coverage of all system elements.
STRIDE review: When the architecture requires a review, there are several features that enable
the architect and security reviewer to communicate. Unmitigated threats (threats that have no
controls assigned) will be shown as warnings in the DFD diagram. This makes it possible to see
any issue at a glance.</p>
        <p>Collaborative features: There are also collaborative features built into the tool. This includes
marking a model as in need of review. Once the review has commenced, the reviewer can set
action items for developers and architects to follow up on. These action items are handy when
performing a follow-up review to observe and document the actions that have been taken. All
relevant events can be sent as mail to notify the review team and developers. The modeling tool
is also fully real-time multi-user - meaning that during a review session both the auditor and
developer can change the model.</p>
        <p>While the tool itself is quite straightforward, its implementation in the organisation is more
complex. The next section will discuss the implementation in this case.</p>
      </sec>
      <sec id="sec-4-2">
        <title>4.2. Lessons learned from the tool implementation</title>
        <p>The implementation of the tool in the case highlighted several key enablers for its successful
adoption. Some positive and negative aspects were also uncovered.</p>
        <p>Tool learning curve. Initially, the learning curve presented a significant challenge, as many
developers were unfamiliar with modeling techniques. To mitigate this, special training sessions
were introduced, supplemented by the availability of support bookings for tool use. Auditing
sessions also served as a learning platform, providing feedback on model implementations and
fostering continuous improvement. The prerequisite knowledge of STRIDE emerged as a critical
enabler for tool utilisation. Recognising the gap in widespread STRIDE familiarity, efforts were
made to educate the user base, emphasising the importance of understanding this framework to
leverage the tool effectively. Gradually the developers learn the analysis and the tool, and now
most models are created by developers themselves.</p>
        <p>Tool design. Flexibility in the tool’s design proved beneficial, allowing teams to incorporate
project-specific components and guidelines in the form of templates. This adaptability was
further enhanced by filtering mechanisms that excluded irrelevant data, such as third-party
integrations, thereby streamlining the focus on central security responsibilities.</p>
        <p>The adoption of the tool brought several positive aspects. Adopting the tool yielded significant
benefits, notably reducing the burden on the security team by minimising the time and personnel
required for auditing. It facilitated a more structured approach to security, generating models,
graphical presentations, and documentation for applications and microservices. The tool also
enabled a structured security review process, compelling developers to document their
adherence to for example security protocols and the usage of encryption standards, thereby
identifying and rectifying outdated practices.</p>
        <p>Several challenges were also encountered in the case. Engaging teams to initiate tool usage
was difficult; however, this was effectively addressed by replacing self-guided instruction with
facilitated training sessions, which enhanced understanding and engagement. The complexity of
some models posed another obstacle, discouraging early adoption. This issue was similarly
overcome through guided sessions, which provided direct support and guidance, enabling more
effective model simplification from the outset. A guide was also built into the tool, explaining the
basic concepts of the model.</p>
        <p>A noted drawback with the use of the tool was the increased complexity introduced into the
development process. The requirement for detailed security documentation, while beneficial for
security oversight, was initially perceived as an additional burden by developers. This
underscores the need for balancing security rigor with development efficiency, a challenge that
will inform future tool enhancements and training approaches.</p>
      </sec>
    </sec>
    <sec id="sec-5">
      <title>5. Systemic effects of using the tool</title>
      <p>
        In this section, we analyse the systemic effects of implementing the ZT modeling tool within the
case, guided by the Viable System Model (VSM) [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ]. VSM provides a framework for
understanding the organisation as an integrated, living system, balancing both operational needs
and strategic objectives. By mapping the tool’s functions to the components of VSM, we can
elucidate how it supports and enhances the organisation’s ZT security posture.
      </p>
      <p>The Viable System Model (VSM), developed by Stafford Beer, is a framework designed to
understand and manage complex organisational systems. Rooted in cybernetics, the study of
systems and their regulatory mechanisms, VSM provides a way to diagnose and design
organisations to ensure their viability. At its core, VSM conceptualises any viable system,
whether an organism, a machine, or an organisation, as consisting of five essential functions or
subsystems. These subsystems are responsible for operations, coordination, control,
intelligence, and policy. Table 1 gives an introduction to VSM subsystems 1-5 (column 1), what
the subsystems need to handle when it comes to ZT and microservice development (2), the
problem each subsystem exhibits (3), and how the presented tool helps each subsystem (4)
based on its functions (5).</p>
      <p>Notable, adding the collaborative functions to the tool enables the tool to also support the
higher level subsystem of VSM. While the table outlines the benefits for the subsystems, some
drawbacks can also be noted. The modeling tool, while beneficial in enforcing security protocols
and aiding coordination (System 2), could due to the learning curve, temporarily disrupt daily
operations (System 1), due to increased burden on developers, potentially slowing down routine
tasks. Furthermore, if the tool is used for unneeded rigid implementation of ZT principles, which
is not the case at the studied organisation, it might create resistance within development teams,
affecting overall organisational coherence (System 5).</p>
      <p>System 4 Planning of new Micro-services are The tool provides a Gives a list of ongoing
(Development/Planning): micro-services. quite complex, thus it good overview of and existing
microFocuses on the future. Assessment of is difficult to get an the existing services projects.
Plans for change, changes that overview of the microservices and Give the current
adaptation, and need to be done. existing services. This their security levels, status of the security
sustainability in the makes it difficult to which provides a efforts.
evolving environment. motivate and plan for good foundation for</p>
      <p>changes. future changes.</p>
      <p>System 5
(Policy/Identity):
Highest level of the
system. Sets the
organisation’s purpose,
values, and oversees all
other systems</p>
      <p>Forms a unified ZTsecurity, due to the Helps foster a The tool provides a
culture and extra effort required, shared and holistic and coherent
understanding may create resistance streamlined way of set of functions.
of within development working according Thereby embodying
ZTdevelopment. teams. to ZTprinciples. the organisation’s</p>
      <p>Creates a culture of purpose of being a
continuous secure partner for
awareness. transactions.</p>
    </sec>
    <sec id="sec-6">
      <title>6. Conclusion</title>
      <p>In this paper we presented a multi-user modeling tool designed to support the implementation
of ZT security principles within a microservices architecture at a bank. The tool integrates data
flow diagrams (DFDs) and STRIDE threat analysis, offering both semi-automated and manual
security assessments. Through a case study at a bank, we demonstrated the tool’s potential
impact on various organisational levels, guided by the Viable System Model (VSM).</p>
      <p>While the tool effectively structures the security team’s work, and provides a structured
approach to security, it also introduces challenges. The initial learning curve and the complexity
of detailed security documentation need an initial effort in training. Despite challenges, the tool’s
ability to enforce consistent security policies and facilitate coordination across teams is a
significant advantage. A sign that the advantages outweigh the initial learning curve is that the
examined case organisation has continued using the tool, and its use is even widened as more
and more of its software services are making use of the tool.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <given-names>N.F.</given-names>
            <surname>Syed</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.W.</given-names>
            <surname>Shah</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Shaghaghi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Anwar</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Z.</given-names>
            <surname>Baig</surname>
          </string-name>
          , and
          <string-name>
            <given-names>R.</given-names>
            <surname>Doss</surname>
          </string-name>
          ,
          <article-title>Zero trust architecture (ZTA): A comprehensive survey</article-title>
          .
          <source>IEEE</source>
          ,
          <year>2022</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <given-names>A.</given-names>
            <surname>Kerman</surname>
          </string-name>
          ,
          <string-name>
            <given-names>O.</given-names>
            <surname>Borchert</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Rose</surname>
          </string-name>
          ,
          <article-title>and</article-title>
          <string-name>
            <given-names>A.</given-names>
            <surname>Tan</surname>
          </string-name>
          ,
          <article-title>Implementing a zero trust architecture</article-title>
          ,
          <source>National Institute of Standards and Technology (NIST)</source>
          ,
          <year>2020</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <given-names>S.</given-names>
            <surname>Beer</surname>
          </string-name>
          , The Heart of Enterprise, Chichester: John Wiley &amp; Sons,
          <year>1994</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <given-names>A.</given-names>
            <surname>Wylde</surname>
          </string-name>
          ,
          <article-title>Zero trust: Never trust, always verify</article-title>
          , In 2021 international conference
          <article-title>on cyber situational awareness, data analytics and assessment (cybersa)</article-title>
          , IEEE,
          <year>2021</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [5]
          <string-name>
            <given-names>Z.</given-names>
            <surname>Adahman</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.W.</given-names>
            <surname>Malik</surname>
          </string-name>
          , and
          <string-name>
            <given-names>Z.</given-names>
            <surname>Anwar</surname>
          </string-name>
          ,
          <article-title>An analysis of zero-trust architecture and its costeffectiveness for organisational security</article-title>
          ,
          <source>Computers &amp; Security</source>
          ,
          <volume>122</volume>
          ,
          <year>2022</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [6]
          <string-name>
            <given-names>S.</given-names>
            <surname>Teerakanok</surname>
          </string-name>
          ,
          <string-name>
            <given-names>T.</given-names>
            <surname>Uehara</surname>
          </string-name>
          ,
          <article-title>and</article-title>
          <string-name>
            <given-names>A.</given-names>
            <surname>Inomata</surname>
          </string-name>
          ,
          <article-title>Migrating to zero trust architecture: Reviews and challenges</article-title>
          ,
          <source>Security and Communication Networks</source>
          ,
          <source>2021(1)</source>
          ,
          <year>2021</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [7]
          <string-name>
            <given-names>N.</given-names>
            <surname>Mayer</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Aubert</surname>
          </string-name>
          , E. Grandry, and
          <string-name>
            <given-names>C.</given-names>
            <surname>Feltus</surname>
          </string-name>
          ,
          <article-title>An integrated conceptual model for information system security risk management and enterprise architecture management based on Togaf</article-title>
          ,
          <source>In The Practice of Enterprise Modeling: 9th IFIP WG 8</source>
          .1. Working Conference,
          <source>PoEM</source>
          <year>2016</year>
          , Skövde, Sweden,
          <year>2016</year>
          . Springer International Publishing,
          <year>2016</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [8]
          <string-name>
            <given-names>R.</given-names>
            <surname>Wirtz</surname>
          </string-name>
          and
          <string-name>
            <given-names>M.</given-names>
            <surname>Heisel</surname>
          </string-name>
          ,
          <article-title>Model-based risk analysis and evaluation using CORAS and CVSS</article-title>
          , In Evaluation of Novel Approaches to Software Engineering: 14th International Conference, ENASE 2019, Heraklion, Crete, Greece,
          <year>2019</year>
          . Springer International Publishing,
          <year>2020</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          [9]
          <string-name>
            <surname>Microsoft</surname>
          </string-name>
          , Threat Modeling Tool,
          <year>Accessed 2024</year>
          -
          <volume>05</volume>
          -12 URL: https://learn.microsoft.com/en-us/azure/security/develop/threat-modeling-tool
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          [10]
          <string-name>
            <given-names>P.</given-names>
            <surname>Johannesson</surname>
          </string-name>
          and
          <string-name>
            <given-names>E.</given-names>
            <surname>Perjons</surname>
          </string-name>
          , An Introduction to Design Science, 2nd ed., Springer International Publishing,
          <year>2021</year>
          .
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>