The modelling should incorporate how the system relates to the organisation’s business plan, because this determines how it will be used, where the data will flow through the system and the sorts of people who will be using it.
“A good example is something like a human resources system,” says Cooke. “Understanding the types of people who are using it will help us understand how certain weaknesses could be taken advantage of where people have certain patterns of behaviour.”
Stage 2: What are the vulnerabilities in our systems and processes?
During the second step — identifying where the vulnerabilities in systems and processes that expose the organisation to the greatest risk are — it is important to assess the criticality of our assets from various viewpoints and stakeholders.
“This is where business analysts and others who understand how the system operates are really useful,” says Cooke. “It’s where we identify potential weaknesses in the system and the types of actors who are expected to target the system. Do we exist in a certain type of business that is more prone to attacks from certain types of threat actors over others?”
Stage 3: What actions must we take to mitigate risks?
Once identified, the threats and vulnerabilities are prioritised before moving on to the next step — what decisive actions must we take to strengthen our defences and mitigate these risks?
Organisations can draw on several recognised security frameworks to help mitigate the steps with technical solutions, but as Cooke points out, all mitigation efforts should include the human element and the processes for using an IT system.
“If we don't define a process well enough to help mitigate a potential weakness, then a human might still do the wrong thing or be forced to take the wrong path down a system interaction, which can also introduce weaknesses,” he says. “The controls we put in place to mitigate that could be technical or they could be process-driven. It could be improving that process itself.”
Stage 4: How confident are we in our current security measures?
The final step is about ensuring confidence that an organisation’s current security measures are effectively safeguarding its most vital assets from evolving threats. For instance, are risk mitigation controls performing in the way the business needs, or have new vulnerabilities been introduced?
How CommBank uses cyber threat modelling
Cyber threat modelling at CommBank plays a significant role in understanding the vulnerability and threat landscape that assists the Group in addressing cyber risk. It also involves collecting intelligence on threats that have occurred outside the bank. Husari’s team assesses those security threats and incidents, then works to ensure the same attacks don’t occur within CommBank.
“Our priority intelligence requirements (PIRs) refer to the crucial information necessary for our stakeholders to make intelligence-led decisions, meeting primary goals and evaluating possible risks to the Group,” says Husari.
“When we've assessed an event, our team will gather the technical, tactical and strategic data, and process it in various ways to ensure our stakeholders receive our intel in a relevant and timely manner to action the intelligence we’ve provided.
“Once our tactical intel is utilised, it will automatically be sent to our detection mechanisms — so each asset is then protected against what has occurred externally that may affect the Group.”
The team also forecasts specific types of threats — for instance, an increase in ransomware threats — and examines why they are occurring. This helps with prioritising controls, highlighting risks and supporting executive decisions by allowing them to factor in trends in the cyber threat landscape.
Husari works closely with stakeholders in other parts of the bank to evaluate their key IT assets and priorities, and assess what sort of intelligence they require. His team also monitors the dark web to see if there is any concerning information or data for sale that could introduce a security vulnerability or indicate a breach, such as customer or staff credentials, NetBank credentials or credit card numbers.
Incorporating cyber threat modelling into your business strategy is crucial for proactively addressing vulnerabilities, mitigating risks, and enhancing resilience against evolving cyber threats. To learn more about strengthening your business's cyber resilience and the role of threat modelling, visit commbank.com.au/business/security.