awslabs / threat-composer

A simple threat modeling tool to help humans to reduce time-to-value when threat modeling
https://awslabs.github.io/threat-composer/
Apache License 2.0
429 stars 48 forks source link

[FEATURE] Ability to record the status of mitigations #61

Closed nguforw closed 1 week ago

nguforw commented 9 months ago

Describe the feature

I would like to be able to capture the status of any mitigations that are documented within threat composer

Use Case

Mitigations are the "What are we going to do about it?" part of threat modelling. Whilst threat composer allows you to define mitigations, it does leave you with a fair amount of ambiguity regarding the actual status of the mitigations. If a mitigation is captured against a threat, the tool will indicate that the threat has been mitigated. But it fails to capture the fact that the mitigation may not actually have been implemented. This leads to a false sense of security.

Proposed Solution

Add a new "Status" field against each mitigation with the following values:

Other Information

No response

Acknowledgements

jessieweiyi commented 9 months ago

Hi @nguforw, Thanks for raising the feature request. We have added it into our backlog.

dboyd13 commented 3 weeks ago

The following is a combined proposal for both the ask for Mitigation status (#61) and Threat status (#126) given the interplay between them.


Ask: @nguforw for your feedback (and anyone else reading this) on if the below proposal would address your use case.


Broad design philosophy and decisions

We propose the tool will:

  1. Focus on capturing outcome states for threats (risks) and mitigations (actions). In our experience, the combination of interim states, their associated business logic and risk management making process is highly customer specific.
  2. Have static system defined statuses to ensure portability of exports (.tc.json) between deployments, and to maximise the usefulness of any associated 'Insight dashboard' widgets that would be created.
  3. Allow for a degree of organisational customisation of the status, support change of the status "title" and "description" shown in the UI. Note this is applicable only for self-hosted and deployed environments.
  4. Have human readable (english only) values for the static system defined statuses that are human readable (english only) - example: threatIdentified, such that it useful for diffs/PRs for those that use version control methods (which we encourage)
  5. Not track (or of keep an audit log of) status changes. Given the client-side nature of the tool, we do not see this tool as a viable alternative for a workflow tracking or ITSM tool. Additionally, we need to be frugal with our data storage requirements within browser storage, and ensure .tc.json diffs do not become "noisy".

Threat status

Mental model

Proposed statuses

Status in .tc.json export (constant) UI Label (can be changed in build) UI Description (can be changed in build) Comments
threatIdentified "Indentified" (default) - Other possible values you may want in your build could include: "Open", "Active" etc "Potential threat has been identified" All newly added threats get this status
threatResolved "Resolved" (default) - Other possible values you may want in your build include: "Mitigated", "Complete" etc "All agreed risk response actions (mitigation, transfer, avoidance, risk acceptance) have been completed aligned to our risk tolerance" As noted above there is always amount of residual risk acceptance (unless one avoids the risk) - hence we will not include a seperate status for "Risk Accept" it will form part of "Resolved"
threatResolvedNotUseful "Not Useful" (default) - Other possible values you may want in your build could include: "False positive" etc "This threat is invalid / not applicable to our use system" We consider "Resolved" and "NotUseful" as both being outcome state - so both will include the term "Resolved" in their system defined code threatResolved and threatResolvedNotUseful respectively.

UI placement

Screenshot 2024-08-02 at 9 06 35 AM

Business logic

Dashboard

Mitigation status

Mental model

Proposed statuses

Status in .tc.json export (constant) UI Label (can be changed in build) UI Description (can be changed in build) Comments
mitigationIdentified "Indentified" (default) - Other possible values you may want in your build could include: "Idea", "Planned", "Backlog" "Mitigation has been identified" All newly added mitigations get this status
mitigationInProgress “In-Progress" (default) - Other possible values you may want in your build include: "Doing" "Mitigation is in-progress"
mitigationResolved “Resolved" (default) - Other possible values you may want in your build could include: "Implemented", "Complete","Accepted" etc “Mitigation has been completed to an agreed scoped” We do not have the notion of "Partially Resolved" as we see that as" Resolved" where the mitigation has been completed to an agreed scope. Meaning if partial... that was agreed. We capture the outcome only.
mitigationResolvedAbandoned "Abandoned" (default) - Other possible values you may want in your build could include: "Won't do" etc "Will not be implementing this mitigation"

UI placement

Screenshot 2024-08-01 at 4 59 29 PM

Business logic

Dashboard

github-actions[bot] commented 1 week ago

:tada: This issue has been resolved in version 1.0.57 :tada:

The release is available on GitHub release

Your semantic-release bot :package::rocket: