×

System for generation and reuse of resource-centric threat modeling templates and identifying controls for securing technology resources

  • US 9,832,201 B1
  • Filed: 05/16/2016
  • Issued: 11/28/2017
  • Est. Priority Date: 05/16/2016
  • Status: Active Grant
First Claim
Patent Images

1. A system for generation and implementation of threat vector templates and implementing controls for securing technology resources, the system comprising:

  • at least one non-transitory storage device;

    at least one processor; and

    instruction code stored in said storage device, said instruction code being executable by the at least one processor and configured to cause said at least one processor to;

    electronically receive an analysis request associated with an internal resource from a user device associated with a user;

    determine that an internal resource in a network requires protection from unauthorized external access;

    electronically receive information associated with the internal resource within the network, wherein the information associated with the internal resource comprises at least a resource category;

    determine one or more threat vectors associated with the internal resource, wherein the one or more threat vectors indicate one or more paths of access to the internal resource;

    electronically retrieve from a controls library, a control template associated with a resource category matching the resource category of the internal resource, wherein the control template comprises a map of one or more controls to be applied to each of the one or more threat vectors associated with the internal resource, wherein the one or more controls are configured to determine access to the internal resource;

    apply the control template to the internal resource, whereby the one or more controls associated with the at least one of the one or more threat vectors is configured for detecting the access to the internal resource via at least one of one or more types of access;

    determine a frequency score associated with each of the one or more threat vectors, wherein the frequency score indicates a number of occurrence of a threat via each of the one or more threat vectors;

    determine a magnitude of impact score associated with each of the one or more threat vectors, wherein the magnitude of impact score indicates a consequence of a loss event caused via each of the one or more threat vectors;

    determine a strength associated with each of the one or more controls associated with each of the one or more threat vectors;

    determine an exposure score associated with each of the one or more threat vectors based on at least the frequency score, the magnitude of impact score, and the strength associated with each of the one or more controls associated with each of the one or more threat vectors;

    determine that the exposure score associated with at least one of the one or more threat vectors is greater than a predetermined threshold;

    determine one or more additional controls configured for detecting the access to the internal resource, wherein the one or more controls are stored in a controls library;

    initiate, via an established communicable link, a recommendation interface for display on the user device, the recommendation interface comprising the one or more additional controls recommended to the user for incorporation;

    electronically receive, via the established communication link, a user selection of at least one of the one or more additional controls recommended to the user; and

    incorporate the one or more additional controls selected by the user, wherein incorporating the one or more additional controls lowers the exposure score to below the predetermined threshold.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×