SlideShare a Scribd company logo
Reviewing BPMN as a Modeling
Notation for CACAO Security
Playbooks
Authors: Mateusz Zych, Vasileios Mavroeidis, Konstantinos Fysarakis, Manos Athanatos
Cyentific AS
Projects supported this research:
Ph.D. Research Fellow Mateusz Zych
Cyentific AS
Present Status of Cybersecurity
● Increasing and more sophisticated cyber attacks
● Asynchronous time advantage between adversaries and defenders
● Defenders must prepare, coordinate, automate, document and share their response
methodologies
● EU: NIS Legislation (Network and Information Security)
● Collaborative Automated Course of Action Operations (CACAO)
2 of 13
Ph.D. Research Fellow Mateusz Zych
Cyentific AS
Collaborative Automated Course
of Action Operations (CACAO)
● Schema and taxonomy for cybersecurity playbooks
● Machine-readable
● Vendor-agnostic
● Maintained by the OASIS CACAO TC
● Early adoption
3 of 13
Ph.D. Research Fellow Mateusz Zych
Cyentific AS
Problem Statement/The Need
● CACAO:
○ New OASIS standard (upcoming)
○ Early adoption
○ No tools
○ No modeling notation
○ Challenging to work with
4 of 13
Ph.D. Research Fellow Mateusz Zych
Cyentific AS
Our Aim
● Examine the use of BPMN modeling notation as a candidate to graphically represent CACAO
playbooks
● Provide a high-level construct mapping between CACAO and BPMN.
5 of 13
Ph.D. Research Fellow Mateusz Zych
Cyentific AS
Business Process Model Notation (BPMN)
● Maintained by Object Management Group (OMG)
● Published in 2011, ISO/IEC 19510 since 2013
● Mature
● Support different levels of abstraction
● Rich set of graphical elements
● Wide range of tools and platforms.
● Also used for cybersecurity purposes
6 of 13
Ph.D. Research Fellow Mateusz Zych
Cyentific AS 7 of 13
CACAO-BPMN Mapping
Ph.D. Research Fellow Mateusz Zych
Cyentific AS
Use case
8 of 13
Template playbook
in any format
CACAO JSON BPMN Visualization
Create Translate
Ph.D. Research Fellow Mateusz Zych
Cyentific AS
Use Case: Vulnerability Response Process (CISA)
9 of 13
CISA template playbook
CACAO JSON
BPMN (+ BPMN XML)
https://github.com/cyentific-rni/bpmn-cacao
Ph.D. Research Fellow Mateusz Zych
Cyentific AS
Limitations
● Troublesome 1-1 mapping, however attainable
● Some CACAO construct can be modeled in several ways in BPMN
● BPMN Sub-Processes solves few problems but introduces complexity
● User need to be restricted to utilize 1-1 translator
10 of 13
Ph.D. Research Fellow Mateusz Zych
Cyentific AS
Further Work
● One-to-one mapping (in progress)
● BPMN extensions to support all metadata (finishing)
● Translator: CACAO->BPMN and BPMN->CACAO
○ Lossless conversion
11 of 13
Ph.D. Research Fellow Mateusz Zych
Cyentific AS
Conclusion
● Presented and analyzed the mapping
● Validated the feasibility of using BPMN to graphically represent CACAO
● Great value for defenders
○ Decreased time needed for working and understanding CACAO playbooks.
12 of 13
Ph.D. Research Fellow Mateusz Zych
Cyentific AS
Thank you for your attention
Questions?
13 of 13
Get in touch!
Linkedin

More Related Content

Similar to IEEE-CSR-DS4CS-Reviewing BPMN as a Modeling Notation for CACAO Security Playbooks.pdf

Microcontroladores: programación de microcontroladores PIC de 8 bits en C
Microcontroladores: programación de microcontroladores PIC de 8 bits en CMicrocontroladores: programación de microcontroladores PIC de 8 bits en C
Microcontroladores: programación de microcontroladores PIC de 8 bits en C
SANTIAGO PABLO ALBERTO
 
PyConPL 2017 - with python: security
PyConPL 2017 - with python: securityPyConPL 2017 - with python: security
PyConPL 2017 - with python: security
Piotr Dyba
 
Technical debt in machine learning - Data Natives Berlin 2018
Technical debt in machine learning - Data Natives Berlin 2018Technical debt in machine learning - Data Natives Berlin 2018
Technical debt in machine learning - Data Natives Berlin 2018
Jaroslaw Szymczak
 
Software engineering project(srs)!!
Software engineering project(srs)!!Software engineering project(srs)!!
Software engineering project(srs)!!
sourav verma
 
Kallio Chipster Bosc2009
Kallio Chipster Bosc2009Kallio Chipster Bosc2009
Kallio Chipster Bosc2009bosc
 
Agile project management in IT - Sebastian Sussmann
Agile project management in IT - Sebastian SussmannAgile project management in IT - Sebastian Sussmann
Agile project management in IT - Sebastian Sussmann
DevDay.org
 
How npm is making JavaScript safe for everyone
How npm is making JavaScript safe for everyoneHow npm is making JavaScript safe for everyone
How npm is making JavaScript safe for everyone
Daniel Sauble
 
Technical debt in ML | Jaroslaw Szymczak | DN18
Technical debt in ML | Jaroslaw Szymczak | DN18Technical debt in ML | Jaroslaw Szymczak | DN18
Technical debt in ML | Jaroslaw Szymczak | DN18
DataconomyGmbH
 
DN18 | Technical Debt in Machine Learning | Jaroslaw Szymczak | OLX
DN18 | Technical Debt in Machine Learning | Jaroslaw Szymczak | OLXDN18 | Technical Debt in Machine Learning | Jaroslaw Szymczak | OLX
DN18 | Technical Debt in Machine Learning | Jaroslaw Szymczak | OLX
Dataconomy Media
 
202212APSEC.pptx.pdf
202212APSEC.pptx.pdf202212APSEC.pptx.pdf
202212APSEC.pptx.pdf
Hiroshi Maruyama
 
Samsung SDS OpeniT - The possibility of Python
Samsung SDS OpeniT - The possibility of PythonSamsung SDS OpeniT - The possibility of Python
Samsung SDS OpeniT - The possibility of Python
Insuk (Chris) Cho
 
Agile Secure Development
Agile Secure DevelopmentAgile Secure Development
Agile Secure Development
Bosnia Agile
 
Mitre ATT&CK by Mattias Almeflo Nixu
Mitre ATT&CK by Mattias Almeflo NixuMitre ATT&CK by Mattias Almeflo Nixu
Mitre ATT&CK by Mattias Almeflo Nixu
Nixu Corporation
 
OpenStack Control Plane Architectures - Design Solutions
OpenStack Control Plane Architectures - Design SolutionsOpenStack Control Plane Architectures - Design Solutions
OpenStack Control Plane Architectures - Design Solutions
Shane Gibson
 
Se research update
Se research updateSe research update
Se research update
Nacha Chondamrongkul
 
cv-2016-23
cv-2016-23cv-2016-23
cv-2016-23
Sergei Vorobyov
 
praveen projectdocx mini.2 (1).
praveen projectdocx mini.2 (1).praveen projectdocx mini.2 (1).
praveen projectdocx mini.2 (1).
akashganathay
 
Anurag Awasthi - Machine Learning applications for CloudStack
Anurag Awasthi - Machine Learning applications for CloudStackAnurag Awasthi - Machine Learning applications for CloudStack
Anurag Awasthi - Machine Learning applications for CloudStack
ShapeBlue
 
System Security @ NECSTLab and Breaking the Laws of Robotics: Attacking Indus...
System Security @ NECSTLab and Breaking the Laws of Robotics: Attacking Indus...System Security @ NECSTLab and Breaking the Laws of Robotics: Attacking Indus...
System Security @ NECSTLab and Breaking the Laws of Robotics: Attacking Indus...
NECST Lab @ Politecnico di Milano
 

Similar to IEEE-CSR-DS4CS-Reviewing BPMN as a Modeling Notation for CACAO Security Playbooks.pdf (20)

Resume
ResumeResume
Resume
 
Microcontroladores: programación de microcontroladores PIC de 8 bits en C
Microcontroladores: programación de microcontroladores PIC de 8 bits en CMicrocontroladores: programación de microcontroladores PIC de 8 bits en C
Microcontroladores: programación de microcontroladores PIC de 8 bits en C
 
PyConPL 2017 - with python: security
PyConPL 2017 - with python: securityPyConPL 2017 - with python: security
PyConPL 2017 - with python: security
 
Technical debt in machine learning - Data Natives Berlin 2018
Technical debt in machine learning - Data Natives Berlin 2018Technical debt in machine learning - Data Natives Berlin 2018
Technical debt in machine learning - Data Natives Berlin 2018
 
Software engineering project(srs)!!
Software engineering project(srs)!!Software engineering project(srs)!!
Software engineering project(srs)!!
 
Kallio Chipster Bosc2009
Kallio Chipster Bosc2009Kallio Chipster Bosc2009
Kallio Chipster Bosc2009
 
Agile project management in IT - Sebastian Sussmann
Agile project management in IT - Sebastian SussmannAgile project management in IT - Sebastian Sussmann
Agile project management in IT - Sebastian Sussmann
 
How npm is making JavaScript safe for everyone
How npm is making JavaScript safe for everyoneHow npm is making JavaScript safe for everyone
How npm is making JavaScript safe for everyone
 
Technical debt in ML | Jaroslaw Szymczak | DN18
Technical debt in ML | Jaroslaw Szymczak | DN18Technical debt in ML | Jaroslaw Szymczak | DN18
Technical debt in ML | Jaroslaw Szymczak | DN18
 
DN18 | Technical Debt in Machine Learning | Jaroslaw Szymczak | OLX
DN18 | Technical Debt in Machine Learning | Jaroslaw Szymczak | OLXDN18 | Technical Debt in Machine Learning | Jaroslaw Szymczak | OLX
DN18 | Technical Debt in Machine Learning | Jaroslaw Szymczak | OLX
 
202212APSEC.pptx.pdf
202212APSEC.pptx.pdf202212APSEC.pptx.pdf
202212APSEC.pptx.pdf
 
Samsung SDS OpeniT - The possibility of Python
Samsung SDS OpeniT - The possibility of PythonSamsung SDS OpeniT - The possibility of Python
Samsung SDS OpeniT - The possibility of Python
 
Agile Secure Development
Agile Secure DevelopmentAgile Secure Development
Agile Secure Development
 
Mitre ATT&CK by Mattias Almeflo Nixu
Mitre ATT&CK by Mattias Almeflo NixuMitre ATT&CK by Mattias Almeflo Nixu
Mitre ATT&CK by Mattias Almeflo Nixu
 
OpenStack Control Plane Architectures - Design Solutions
OpenStack Control Plane Architectures - Design SolutionsOpenStack Control Plane Architectures - Design Solutions
OpenStack Control Plane Architectures - Design Solutions
 
Se research update
Se research updateSe research update
Se research update
 
cv-2016-23
cv-2016-23cv-2016-23
cv-2016-23
 
praveen projectdocx mini.2 (1).
praveen projectdocx mini.2 (1).praveen projectdocx mini.2 (1).
praveen projectdocx mini.2 (1).
 
Anurag Awasthi - Machine Learning applications for CloudStack
Anurag Awasthi - Machine Learning applications for CloudStackAnurag Awasthi - Machine Learning applications for CloudStack
Anurag Awasthi - Machine Learning applications for CloudStack
 
System Security @ NECSTLab and Breaking the Laws of Robotics: Attacking Indus...
System Security @ NECSTLab and Breaking the Laws of Robotics: Attacking Indus...System Security @ NECSTLab and Breaking the Laws of Robotics: Attacking Indus...
System Security @ NECSTLab and Breaking the Laws of Robotics: Attacking Indus...
 

Recently uploaded

Acorn Recovery: Restore IT infra within minutes
Acorn Recovery: Restore IT infra within minutesAcorn Recovery: Restore IT infra within minutes
Acorn Recovery: Restore IT infra within minutes
IP ServerOne
 
Getting started with Amazon Bedrock Studio and Control Tower
Getting started with Amazon Bedrock Studio and Control TowerGetting started with Amazon Bedrock Studio and Control Tower
Getting started with Amazon Bedrock Studio and Control Tower
Vladimir Samoylov
 
Presentatie 8. Joost van der Linde & Daniel Anderton - Eliq 28 mei 2024
Presentatie 8. Joost van der Linde & Daniel Anderton - Eliq 28 mei 2024Presentatie 8. Joost van der Linde & Daniel Anderton - Eliq 28 mei 2024
Presentatie 8. Joost van der Linde & Daniel Anderton - Eliq 28 mei 2024
Dutch Power
 
Competition and Regulation in Professional Services – KLEINER – June 2024 OEC...
Competition and Regulation in Professional Services – KLEINER – June 2024 OEC...Competition and Regulation in Professional Services – KLEINER – June 2024 OEC...
Competition and Regulation in Professional Services – KLEINER – June 2024 OEC...
OECD Directorate for Financial and Enterprise Affairs
 
Obesity causes and management and associated medical conditions
Obesity causes and management and associated medical conditionsObesity causes and management and associated medical conditions
Obesity causes and management and associated medical conditions
Faculty of Medicine And Health Sciences
 
AWANG ANIQKMALBIN AWANG TAJUDIN B22080004 ASSIGNMENT 2 MPU3193 PHILOSOPHY AND...
AWANG ANIQKMALBIN AWANG TAJUDIN B22080004 ASSIGNMENT 2 MPU3193 PHILOSOPHY AND...AWANG ANIQKMALBIN AWANG TAJUDIN B22080004 ASSIGNMENT 2 MPU3193 PHILOSOPHY AND...
AWANG ANIQKMALBIN AWANG TAJUDIN B22080004 ASSIGNMENT 2 MPU3193 PHILOSOPHY AND...
AwangAniqkmals
 
Doctoral Symposium at the 17th IEEE International Conference on Software Test...
Doctoral Symposium at the 17th IEEE International Conference on Software Test...Doctoral Symposium at the 17th IEEE International Conference on Software Test...
Doctoral Symposium at the 17th IEEE International Conference on Software Test...
Sebastiano Panichella
 
Presentatie 4. Jochen Cremer - TU Delft 28 mei 2024
Presentatie 4. Jochen Cremer - TU Delft 28 mei 2024Presentatie 4. Jochen Cremer - TU Delft 28 mei 2024
Presentatie 4. Jochen Cremer - TU Delft 28 mei 2024
Dutch Power
 
Bonzo subscription_hjjjjjjjj5hhhhhhh_2024.pdf
Bonzo subscription_hjjjjjjjj5hhhhhhh_2024.pdfBonzo subscription_hjjjjjjjj5hhhhhhh_2024.pdf
Bonzo subscription_hjjjjjjjj5hhhhhhh_2024.pdf
khadija278284
 
Announcement of 18th IEEE International Conference on Software Testing, Verif...
Announcement of 18th IEEE International Conference on Software Testing, Verif...Announcement of 18th IEEE International Conference on Software Testing, Verif...
Announcement of 18th IEEE International Conference on Software Testing, Verif...
Sebastiano Panichella
 
Gregory Harris' Civics Presentation.pptx
Gregory Harris' Civics Presentation.pptxGregory Harris' Civics Presentation.pptx
Gregory Harris' Civics Presentation.pptx
gharris9
 
somanykidsbutsofewfathers-140705000023-phpapp02.pptx
somanykidsbutsofewfathers-140705000023-phpapp02.pptxsomanykidsbutsofewfathers-140705000023-phpapp02.pptx
somanykidsbutsofewfathers-140705000023-phpapp02.pptx
Howard Spence
 
María Carolina Martínez - eCommerce Day Colombia 2024
María Carolina Martínez - eCommerce Day Colombia 2024María Carolina Martínez - eCommerce Day Colombia 2024
María Carolina Martínez - eCommerce Day Colombia 2024
eCommerce Institute
 
Bitcoin Lightning wallet and tic-tac-toe game XOXO
Bitcoin Lightning wallet and tic-tac-toe game XOXOBitcoin Lightning wallet and tic-tac-toe game XOXO
Bitcoin Lightning wallet and tic-tac-toe game XOXO
Matjaž Lipuš
 
Media as a Mind Controlling Strategy In Old and Modern Era
Media as a Mind Controlling Strategy In Old and Modern EraMedia as a Mind Controlling Strategy In Old and Modern Era
Media as a Mind Controlling Strategy In Old and Modern Era
faizulhassanfaiz1670
 
0x01 - Newton's Third Law: Static vs. Dynamic Abusers
0x01 - Newton's Third Law:  Static vs. Dynamic Abusers0x01 - Newton's Third Law:  Static vs. Dynamic Abusers
0x01 - Newton's Third Law: Static vs. Dynamic Abusers
OWASP Beja
 
International Workshop on Artificial Intelligence in Software Testing
International Workshop on Artificial Intelligence in Software TestingInternational Workshop on Artificial Intelligence in Software Testing
International Workshop on Artificial Intelligence in Software Testing
Sebastiano Panichella
 
Burning Issue Presentation By Kenmaryon.pdf
Burning Issue Presentation By Kenmaryon.pdfBurning Issue Presentation By Kenmaryon.pdf
Burning Issue Presentation By Kenmaryon.pdf
kkirkland2
 
Supercharge your AI - SSP Industry Breakout Session 2024-v2_1.pdf
Supercharge your AI - SSP Industry Breakout Session 2024-v2_1.pdfSupercharge your AI - SSP Industry Breakout Session 2024-v2_1.pdf
Supercharge your AI - SSP Industry Breakout Session 2024-v2_1.pdf
Access Innovations, Inc.
 
Tom tresser burning issue.pptx My Burning issue
Tom tresser burning issue.pptx My Burning issueTom tresser burning issue.pptx My Burning issue
Tom tresser burning issue.pptx My Burning issue
amekonnen
 

Recently uploaded (20)

Acorn Recovery: Restore IT infra within minutes
Acorn Recovery: Restore IT infra within minutesAcorn Recovery: Restore IT infra within minutes
Acorn Recovery: Restore IT infra within minutes
 
Getting started with Amazon Bedrock Studio and Control Tower
Getting started with Amazon Bedrock Studio and Control TowerGetting started with Amazon Bedrock Studio and Control Tower
Getting started with Amazon Bedrock Studio and Control Tower
 
Presentatie 8. Joost van der Linde & Daniel Anderton - Eliq 28 mei 2024
Presentatie 8. Joost van der Linde & Daniel Anderton - Eliq 28 mei 2024Presentatie 8. Joost van der Linde & Daniel Anderton - Eliq 28 mei 2024
Presentatie 8. Joost van der Linde & Daniel Anderton - Eliq 28 mei 2024
 
Competition and Regulation in Professional Services – KLEINER – June 2024 OEC...
Competition and Regulation in Professional Services – KLEINER – June 2024 OEC...Competition and Regulation in Professional Services – KLEINER – June 2024 OEC...
Competition and Regulation in Professional Services – KLEINER – June 2024 OEC...
 
Obesity causes and management and associated medical conditions
Obesity causes and management and associated medical conditionsObesity causes and management and associated medical conditions
Obesity causes and management and associated medical conditions
 
AWANG ANIQKMALBIN AWANG TAJUDIN B22080004 ASSIGNMENT 2 MPU3193 PHILOSOPHY AND...
AWANG ANIQKMALBIN AWANG TAJUDIN B22080004 ASSIGNMENT 2 MPU3193 PHILOSOPHY AND...AWANG ANIQKMALBIN AWANG TAJUDIN B22080004 ASSIGNMENT 2 MPU3193 PHILOSOPHY AND...
AWANG ANIQKMALBIN AWANG TAJUDIN B22080004 ASSIGNMENT 2 MPU3193 PHILOSOPHY AND...
 
Doctoral Symposium at the 17th IEEE International Conference on Software Test...
Doctoral Symposium at the 17th IEEE International Conference on Software Test...Doctoral Symposium at the 17th IEEE International Conference on Software Test...
Doctoral Symposium at the 17th IEEE International Conference on Software Test...
 
Presentatie 4. Jochen Cremer - TU Delft 28 mei 2024
Presentatie 4. Jochen Cremer - TU Delft 28 mei 2024Presentatie 4. Jochen Cremer - TU Delft 28 mei 2024
Presentatie 4. Jochen Cremer - TU Delft 28 mei 2024
 
Bonzo subscription_hjjjjjjjj5hhhhhhh_2024.pdf
Bonzo subscription_hjjjjjjjj5hhhhhhh_2024.pdfBonzo subscription_hjjjjjjjj5hhhhhhh_2024.pdf
Bonzo subscription_hjjjjjjjj5hhhhhhh_2024.pdf
 
Announcement of 18th IEEE International Conference on Software Testing, Verif...
Announcement of 18th IEEE International Conference on Software Testing, Verif...Announcement of 18th IEEE International Conference on Software Testing, Verif...
Announcement of 18th IEEE International Conference on Software Testing, Verif...
 
Gregory Harris' Civics Presentation.pptx
Gregory Harris' Civics Presentation.pptxGregory Harris' Civics Presentation.pptx
Gregory Harris' Civics Presentation.pptx
 
somanykidsbutsofewfathers-140705000023-phpapp02.pptx
somanykidsbutsofewfathers-140705000023-phpapp02.pptxsomanykidsbutsofewfathers-140705000023-phpapp02.pptx
somanykidsbutsofewfathers-140705000023-phpapp02.pptx
 
María Carolina Martínez - eCommerce Day Colombia 2024
María Carolina Martínez - eCommerce Day Colombia 2024María Carolina Martínez - eCommerce Day Colombia 2024
María Carolina Martínez - eCommerce Day Colombia 2024
 
Bitcoin Lightning wallet and tic-tac-toe game XOXO
Bitcoin Lightning wallet and tic-tac-toe game XOXOBitcoin Lightning wallet and tic-tac-toe game XOXO
Bitcoin Lightning wallet and tic-tac-toe game XOXO
 
Media as a Mind Controlling Strategy In Old and Modern Era
Media as a Mind Controlling Strategy In Old and Modern EraMedia as a Mind Controlling Strategy In Old and Modern Era
Media as a Mind Controlling Strategy In Old and Modern Era
 
0x01 - Newton's Third Law: Static vs. Dynamic Abusers
0x01 - Newton's Third Law:  Static vs. Dynamic Abusers0x01 - Newton's Third Law:  Static vs. Dynamic Abusers
0x01 - Newton's Third Law: Static vs. Dynamic Abusers
 
International Workshop on Artificial Intelligence in Software Testing
International Workshop on Artificial Intelligence in Software TestingInternational Workshop on Artificial Intelligence in Software Testing
International Workshop on Artificial Intelligence in Software Testing
 
Burning Issue Presentation By Kenmaryon.pdf
Burning Issue Presentation By Kenmaryon.pdfBurning Issue Presentation By Kenmaryon.pdf
Burning Issue Presentation By Kenmaryon.pdf
 
Supercharge your AI - SSP Industry Breakout Session 2024-v2_1.pdf
Supercharge your AI - SSP Industry Breakout Session 2024-v2_1.pdfSupercharge your AI - SSP Industry Breakout Session 2024-v2_1.pdf
Supercharge your AI - SSP Industry Breakout Session 2024-v2_1.pdf
 
Tom tresser burning issue.pptx My Burning issue
Tom tresser burning issue.pptx My Burning issueTom tresser burning issue.pptx My Burning issue
Tom tresser burning issue.pptx My Burning issue
 

IEEE-CSR-DS4CS-Reviewing BPMN as a Modeling Notation for CACAO Security Playbooks.pdf

  • 1. Reviewing BPMN as a Modeling Notation for CACAO Security Playbooks Authors: Mateusz Zych, Vasileios Mavroeidis, Konstantinos Fysarakis, Manos Athanatos Cyentific AS Projects supported this research:
  • 2. Ph.D. Research Fellow Mateusz Zych Cyentific AS Present Status of Cybersecurity ● Increasing and more sophisticated cyber attacks ● Asynchronous time advantage between adversaries and defenders ● Defenders must prepare, coordinate, automate, document and share their response methodologies ● EU: NIS Legislation (Network and Information Security) ● Collaborative Automated Course of Action Operations (CACAO) 2 of 13
  • 3. Ph.D. Research Fellow Mateusz Zych Cyentific AS Collaborative Automated Course of Action Operations (CACAO) ● Schema and taxonomy for cybersecurity playbooks ● Machine-readable ● Vendor-agnostic ● Maintained by the OASIS CACAO TC ● Early adoption 3 of 13
  • 4. Ph.D. Research Fellow Mateusz Zych Cyentific AS Problem Statement/The Need ● CACAO: ○ New OASIS standard (upcoming) ○ Early adoption ○ No tools ○ No modeling notation ○ Challenging to work with 4 of 13
  • 5. Ph.D. Research Fellow Mateusz Zych Cyentific AS Our Aim ● Examine the use of BPMN modeling notation as a candidate to graphically represent CACAO playbooks ● Provide a high-level construct mapping between CACAO and BPMN. 5 of 13
  • 6. Ph.D. Research Fellow Mateusz Zych Cyentific AS Business Process Model Notation (BPMN) ● Maintained by Object Management Group (OMG) ● Published in 2011, ISO/IEC 19510 since 2013 ● Mature ● Support different levels of abstraction ● Rich set of graphical elements ● Wide range of tools and platforms. ● Also used for cybersecurity purposes 6 of 13
  • 7. Ph.D. Research Fellow Mateusz Zych Cyentific AS 7 of 13 CACAO-BPMN Mapping
  • 8. Ph.D. Research Fellow Mateusz Zych Cyentific AS Use case 8 of 13 Template playbook in any format CACAO JSON BPMN Visualization Create Translate
  • 9. Ph.D. Research Fellow Mateusz Zych Cyentific AS Use Case: Vulnerability Response Process (CISA) 9 of 13 CISA template playbook CACAO JSON BPMN (+ BPMN XML) https://github.com/cyentific-rni/bpmn-cacao
  • 10. Ph.D. Research Fellow Mateusz Zych Cyentific AS Limitations ● Troublesome 1-1 mapping, however attainable ● Some CACAO construct can be modeled in several ways in BPMN ● BPMN Sub-Processes solves few problems but introduces complexity ● User need to be restricted to utilize 1-1 translator 10 of 13
  • 11. Ph.D. Research Fellow Mateusz Zych Cyentific AS Further Work ● One-to-one mapping (in progress) ● BPMN extensions to support all metadata (finishing) ● Translator: CACAO->BPMN and BPMN->CACAO ○ Lossless conversion 11 of 13
  • 12. Ph.D. Research Fellow Mateusz Zych Cyentific AS Conclusion ● Presented and analyzed the mapping ● Validated the feasibility of using BPMN to graphically represent CACAO ● Great value for defenders ○ Decreased time needed for working and understanding CACAO playbooks. 12 of 13
  • 13. Ph.D. Research Fellow Mateusz Zych Cyentific AS Thank you for your attention Questions? 13 of 13 Get in touch! Linkedin