Replies: 2 comments 5 replies
-
Hello, Statement of Applicability is built based on the measures (Security controls) linked to the informational risks (DB table soa).
Informational risks (IR) are stored in the DB in the
There is no particular documentation about the DB structure correspondence or logic behind, but you might find useful for your goal and understand a bit more if read the following discussions and try to play with them validation your database after each step: Please let us know if you need more help. |
Beta Was this translation helpful? Give feedback.
-
I've given a look to monarc_data.sql that, if I'm right, it's pushed in monarc DB at install-time. So, we can assume that every monarc installation has, internally, related tables. I've seen that within those data there are:
If the above is correct, I assume that as soon as I ADD a NEW referential, during the Risk-Assessment, via the "TAB referential" in the "Knowledge base" of the UI... I can only "bind" my new referential (and related controls) only to one of existing four above. Is this correct? If yes, which is the "official" way to ADD a new referential, from scratch, directly in the "measures" table, so to have it already be ready for interested users, without forcing them to go through the intermediary mapping? |
Beta Was this translation helpful? Give feedback.
-
I'm deeply investigating (aka: reverse-engineer) the way Monarc use to bind Security Controls (es.: ID.AM-1 or ID.GV-1 in NIST Core) to information risks.
I saw that if I associate a "referential" (es.: Nist Core) to a new risk-assessment, at creation time, than in the Statement of Applicability I clearly see that security controls are linked...
... to a table detailing related mapped risks.
This, again, at least if a choose "Nist core" referential and play with a couple of assets.
I want to achieve the same result (binding risk to referential security controls) but with a custom referential (namely: Italian National Cybersecurity Framework, that of course I'm fully committed in creating and deploying accordingly), so the question is: where are the "joining" logic, between the various components (asset, threats, vulnerability, security_referential, security_standard_mapping, etc.) ?
At the moment, I'm analyzing underlying database schema, testing/exercising some querying around measures, measures_amvs, amvs, vulnerabilities, threats, referential tables like
in:
giving out this:
where I get the "join" between the control and the specific vulnerability and threat (I assume I could easily retrieve asset reference as well).
As I'm interested in DEFINING this logic, I also checked the security standard mapping schema (various JSONs downloaded from MOSP), finding something.... but definitely too-little to understand the whole figure :-(
As things are getting a bit complex... I'm trying to POST here, searching for some guidance.
Are there some documentation I can check? Are there some artifacts I can take as a basis? Or, unfortunately, reverse-engineering (both the DB schema and/or the code) is the only way to go?
Thanks everyone, in advance.
Cheers,
DV
Beta Was this translation helpful? Give feedback.
All reactions