Toward a threat model for storage systems

  • Authors:
  • Ragib Hasan;Suvda Myagmar;Adam J. Lee;William Yurcik

  • Affiliations:
  • University of Illinois at Urbana-Champaign (UIUC);University of Illinois at Urbana-Champaign (UIUC);University of Illinois at Urbana-Champaign (UIUC);University of Illinois at Urbana-Champaign (UIUC)

  • Venue:
  • Proceedings of the 2005 ACM workshop on Storage security and survivability
  • Year:
  • 2005

Quantified Score

Hi-index 0.00

Visualization

Abstract

The growing number of storage security breaches as well as the need to adhere to government regulations is driving the need for greater storage protection. However, there is the lack of a comprehensive process to designing storage protection solutions. Designing protection for storage systems is best done by utilizing proactive system engineering rather than reacting with ad hoc countermeasures to the latest attack du jour. The purpose of threat modeling is to organize system threats and vulnerabilities into general classes to be addressed with known storage protection techniques. Although there has been prior work on threat modeling primarily for software applications, to our knowledge this is the first attempt at domain-specific threat modeling for storage systems. We discuss protection challenges unique to storage systems and propose two different processes to creating a threat model for storage systems: one based on classical security principles Confidentiality, Integrity, Availability, Authentication, or CIAA) and another based on the Data Lifecycle Model. It is our hope that this initial work will start a discussion on how to better design and implement storage protection solutions against storage threats.