Mitigations

Mitigation is a generic term to indicate an activity, a pattern or some software that has the intent of reducing the risk caused by some Threat.

Mitigations can be grouped accordingly with a Control Type, which describes when the Mitigation is effective and how it operates. The following Control Types are supported by the Threats Manager Platform.

NameDescription
PreventiveReduces the probability or impact of the threat event.
It buys time for the defenders and forces the attacker to make more actions that may be detected.
It is also called Preventative.
DetectiveDetects an attack while it is in progress.
CorrectiveResponds to the attack, limiting the damage done.
It is sometimes called Responsive.
RecoveryRecover from the damages occurred from an attack.
A typical example is restoring from a database.
DeterrentConvinces the potential attacker that the cost for her may be higher than the potential gain.
OtherOther types of Security Controls.
The Control Types supported by Threats Manager Platform.

Tips & Tricks
Mitigations belonging to different Control Types have different roles. A Preventive Control would delay the attacker, but it would not stop a determined adversary. For this reason, you need to combine Mitigations belonging to Multiple Security Controls. This consideration is in line with the Security Principle known as Defense in Depth.

Mitigations can be linked to Threat Types and Threat Events, with different meanings, discussed below.

Standard Mitigations

Mitigations can be associated with a Threat Type. When this occurs, the associated Mitigation is considered a Standard Mitigation for the said Threat Type, and as a result, it is a recommended Mitigation for Threat Events derived from the Threat Type.

Standard Mitigations are represented by objects called Threat Type Mitigations, which act as logical links between the Threat Types and their Mitigations. Those objects have an additional information, the Strength, which can assume one of the following values:

Known Mitigations can be edited from the Threat Type List or from the Known Mitigation List, in the View ribbon.

The View ribbon.

To create a new Mitigation, open the Known Mitigation List, then click the Add Mitigation: this will open a dialog where you will be asked to insert the name of the Mitigation, optionally a description and its Control Type.

It is also possible to create new Mitigations when you associate it to a Threat Type: in this case, the creation of the Mitigation will be contextual to the creation of the Threat Type Mitigation.

Tips & Tricks
Given that Threat Type Mitigations are only links to Mitigations, you cannot edit the underlying Mitigation from a Threat Type Mitigation shown in the Threat Type List or in the Known Mitigation List. To do that, you have to click on action Edit the underlying Mitigation, which will open an Item Editor dialog on the underlying Mitigation.

Threat Event Mitigations

Mitigations can be associated to a Threat Event, to indicate what can be done, has been done or has been planned for addressing the Threat Event.

They are represented by objects called Threat Event Mitigations, which act as logical link between the Threat Events and their Mitigations. Those objects have two additional pieces of information:

The Mitigation Status can assume the following values:

Tips & Tricks
There is an additional Mitigation Status: Undefined.
It is very important to ensure that no Mitigation has been assigned he Undefined status at the end of the Threat Model, because this may prevent the Mitigation to be visible in the generated reports.

Threat Event Mitigations can be edited from the Threat Event List or from the Mitigation List, in the Home ribbon.

The Home ribbon.

To create a new Threat Event Mitigation from an existing or new Mitigation, you can select the Threat Event and then click the Add button in the Item Editor: this will open a dialog where you will be asked to specify the Mitigation to be associated, or insert the name of the Mitigation, optionally a description and its Control Type and Mitigation Status.

Tips & Tricks
Given that Threat Event Mitigations are only links to Mitigations, you cannot edit the underlying Mitigation from a Threat Event Mitigation shown in the Threat Event List or in the Mitigation List. To do that, you have to click on action Edit the underlying Mitigation, which will open an Item Editor dialog on the underlying Mitigation.