Security Policy and Resiliency Tools and ANalysis (SPARTAN)
The role of the Systems Engineer is to specify a design that meets stakeholder needs. The ability of a design to be resilient to a variety of classes of cyberattack is a first-class stakeholder need that Systems Engineers and their tools are currently ill-equipped to handle. STR has developed a suite of tools that leverage standard Systems Engineering artifacts to expose and prioritize the protections that must be added to the system, from the earliest phases of design, to be resilient to cyberattack. STR’s Security Policy and Resiliency Tools and ANalysis (SPARTAN) toolchain can process system architecture models represented in either the Architecture Analysis and Design Language (AADL) or the Systems Modeling Language (SysML) to reason about which data transfers between system component are allowed, under what conditions, and which connections are not. Thus, SPARTAN builds a mathematical representation of the complete space of Cyber Requirements (CRs) from the modeling artifacts, which enumerate all data transfers between components that shall not occur in the design. Failure of the system to obey a CR, which will allow unintended accesses of system components to occur, represents a fault. A resilient system needs to display fault tolerance, the ability to retain critical mission functionality in the presence of faults. To reason about resiliency, SPARTAN leverages the modeling capabilities of SysML to capture the system level failures that may be triggered by component level faults. The resulting Cyber Resiliency Requirements (CRRs) are then assessed for impact on system failure risk using agent-based modeling and Monte Carlo simulations.