Activity-in-Diagram: Identify the Cyber-attack Surface
CreatorTim Ramey
Description
The different points in a system architecture where an attacker could gain entry to compromise a system or steal information from the system. The system's exposure to reachable and exploitable vulnerabilities (i.e., any connections, data exchange, service, removable media, etc., that could expose the system to potential threat access).
Owning Diagram A2: Phase 2: Characterize Attack Surface
Decomposition
A21: Identify the Cyber-attack Surface
Input
DoDAF Architecture Views
system design
Output
key cyber terrain
mission decomposition
Control
CONOPS
catalog of cybersecurity requirements
Cheif Developmental Tester
Mechanism
Cybersecurity DT&E Technical Experts