Process digitization and integration is an increasing need for enterprises, while cyber-attacks denote a growing threat. Using the Business Process Management Notation (BPMN) is common to handle the digital and integration focus within and across organizations. In other parts of the same companies, threat modeling and attack graphs are used for analyzing the security posture and resilience. In this paper, we propose a novel approach to use attack graph simulations on processes represented in BPMN. Our contributions are the identification of BPMN's attack surface, a mapping of BPMN elements to concepts in a Meta Attack Language (MAL)-based Domain-Specific Language (DSL), called coreLang, and a prototype to demonstrate our approach in a case study using a real-world invoice integration process. The study shows that non-invasively enriching BPMN instances with cybersecurity analysis through attack graphs is possible without much human expert input. The resulting insights into potential vulnerabilities could be beneficial for the process modelers.
翻译:使用业务流程管理标记(BPMN)处理组织内部和组织之间的数字和一体化焦点是常见的。在同一家公司的其他地方,使用威胁模型和攻击图分析安全态势和复原力。在本文中,我们建议采用新颖的办法,对在BPMN中代表的流程使用攻击图模拟。我们的贡献是确定BPMN的攻击表面,将BPMN元素绘制成以Meta攻击语言(MAL)为主的多域特有语言(DSL)中的概念,称为核心语言(DSL),以及利用真实世界发票集成过程在案例研究中展示我们的方法的原型。研究表明,通过攻击图进行网络安全分析,非侵入性地丰富BPMN案例的可能性不大。由此对潜在脆弱性的洞察了解可能对进程模型有益。