OpenTRICK – General overview

The OpenTRICK user guide introduces the user to all the functionalities of the application.

Note that this user guide describes the views for a user having all access rights. Users with less access rights may have a restricted view or access to functionalities such that they cannot see or use all functionalities that will be explained in the user guide. The management of user access rights is explained in [Section] and [Section].

OpenTRICK Login page

After connecting to the OpenTRICK URL, the user sees the following login interface. He has the possibility to:

The different options are explained in the following sub-sections.

OpenTRICK login.

Creating an account

To use OpenTRICK, you shall first create an account. To create an account, click on the “Create an account” button, highlighted in red in [Figure].

Creating a new account.

After clicking on the “Create an account” button, you will be invited to enter further information required to set up your account(see [Figure] below).

Signing up.

You should complete the form and then confirm by clicking on “Sign up”. All six fields seen in the above figure are mandatory. When completed correctly, you can log in.

Logging in

Once you have created your account, you can log in to OpenTRICK. The log-in screen can be seen in [Figure]. Here, you must enter the username and password and click “Sign in”.

OpenTRICK administrators will get informed (by e-mail) that a new user has just registered.

Reset password

In case you have forgotten your password, you can reset your password by clicking on the “Reset password” link on the login interface of OpenTRICK (see [Figure]).

Reset password – Step 1.

You will be redirected to the reset password interface (see [Figure]) where you must enter either your username or your e-mail address that you indicated during registration.

Reset password – Step 2.

After clicking on the “Reset password” button, you will receive an e-mail that includes a link that redirects you to a web page where you can choose a new password (see [Figure]).

Reset password – Step 3.

Two-Factor Authentication (2FA)

When Two-Factor Authentication (2FA) is enabled (both system-wide, and for the user in question), a user will be prompted to enter a security code in addition. He can obtain such a security either via e-mail, or via a smartphone app that supports the TOTP (Time-Based One-Time Password) protocol. Such an app is available for all major smartphones (Android, macOS, Windows Mobile) in the respective stores.

2FA via e-mail

Right after providing the login credentials, you will see the 2FA screen (see [Figure]). Select the “Send an email to …” entry from the select box, and confirm your e-mail address by typing it below.

Two-Factor Authentication screen for 2FA via e-mail.

A 6-digit code will be sent to your e-mail address right after you click “Send code”. Note that it can take several moments until you receive it – also make sure to check your “Junk” folder. Enter the code into the text box (see [Figure]) and proceed with signing in.

Enter Two-Factor Authentication code.

2FA via mobile

If you have set up 2FA via mobile in your profile settings (see [Section]), there is an additional entry “Use mobile application” in the select box. Open the Two-Factor Authentication app on your mobile, and copy the 6-digit code shown there into the text box in OpenTRICK (see [Figure]).

Two-Factor Authentication screen for 2FA via mobile.

Home screen

After successfully logging in to OpenTRICK, you will be presented with the following screen, shown in [Figure] below.

Welcome to OpenTRICK!

This is the Home screen of OpenTRICK. As seen in the navigation bar at the top of [Figure], from here you have the option to click on the following links:

Depending on your access rights, not all options will be visible for you.

The following sub-chapters further explain the contents of the different navigation tabs.

Knowledge base

The Knowledge base is split into the following 5 sections:

The meaning and functionalities concerning those 5 sections will be explained in the following subsections.

Customers

This table contains a list of customer details which can be stored for reference. Information regarding customers can be added, edited, and deleted using the options in the navigation at the top of the table.

List of customers.

For adding a new customer, click on the “Add” button. All information fields must be filled out, including the company name, a contact person, a phone number, e-mail address, a postal address, the city where the customer is located, the zip code and the name of the country where the company is located.

Add new customer.

For editing or deleting a customer, you must select the customer and click on the appropriate button (“Edit” or “Delete”).

Customers have report templates associated to them. These templates serve as a base for the exported reports for risk analyses associated to that customer. Click “Manage customer report templates” to open a dialog for managing them.

Manage the report templates for a customer.

In the “Manage customer report templates” dialog, a list of all available templates is presented. At the top of the list, the default templates deployed with OpenTRICK are listed; these cannot be edited or deleted. Below, custom templates are listed. To add a template, click the “Add” button.

Add or edit a report template for a customer.

In that dialog, you need to specify a type and a language. These specify to which risk analyses the template applies to; the template will only be available for export if the type and language match. The version that is specified is used to check if the template is outdated, or not. If the version specified here corresponds to the version of the template deployed by default, then it is considered to be up to date. Otherwise, it is considered to be obsolete (in which case you can still use the template, but a warning will be displayed). The uploaded file must be in DOCX format.

Custom Excel templates

Staring release 2.16 onwards the tool also supports the excel templates which can be used to generate the following excel output files or reports by default. Like the word templates these templates can similarly be updated or revised.

Adding macro enabled template

In order that the macros work well with the exported excel files for a specific customer it is required to add a Macro enabled excel Template (with extension: xlsm). Once an excel file for example risk estimation is exported from Trick the macros must be unblocked after the exported file is saved so that the Macros work well. After exporting file once this template is used right click on the exported file and go to Properties and click on unblock checkbox to unblock the macros.

Unblocking macros for exported file.

Languages

This table shows the different languages that are supported for translating the security measures of a standard. If you add a language, you can define a translation in the newly added language for each security measure.

List of languages.

You can add, edit, or delete a language. Required information to add a new language is a language code according to ISO 3166-1 alpha-3, the language name, and an alternative name for the language.

Add a new language.

To edit or delete a language, you must select a language and then click on the edit or delete button.

Measures collections

This section includes a repository of standards and collections of security measures that can be included in the risk analyses. The available options are explained in the following subsections.

List of Measure collections.

Add

With the “Add” button, you can add a new measures collection from scratch. Required information are the name of the measure collection, the internal name, a version number (for standards: this is normally the year when the standard was published), a brief description of the measures collection (for standards: this could be the title of the standard), the type of the measures collection (per default normal) and an indication if the measures of the collection can be used to treat risks (by ticking the “Computable” check box) or whether they only exist for compliance reasons.

To add security measures to the newly created collection, follow the guide of the following section.

Add a new standard.

Show measures

The “Show measures” button opens a new dialog listing all security measures of the selected measures collection.

You have the possibility to add, edit or delete a security measure. With the help of the language select box on the right corner, you can switch between the different languages.

List of security measures.

To add a new security measure, press the “Add” button and provide the following information:

Add new security measure.

To edit and modify an existing security measure, select the security measure to be edited and click on the “Edit” button.

To delete a security measure, select the security measure to delete and click on the “Delete” button. If a security measure is used in a risk analysis, it is not possible to delete the security measure except if you click on the “Force delete” (only if you are admin or supervisor) button.

This will not only delete the security measure in the knowledge base, but also in all risk analysis that use this measure.

Export

The “Export” button enables you to export a measures collection from the knowledge base of OpenTRICK. The export is an Excel file including all security measures. You have the possibility to make changes in this excel file and use the “Import” function to reimport the measures collection with the modifications made (see section “Import ”).

Edit

The “Edit” button can be used to update the general information concerning the measures collection (name, version, description, type, internal name, computable).

Get import template

With the “Get import template”, you can retrieve the template needed to import a new measures collection and its security measures (see section “Import ”). The template indicates on how the data must be structured in order to be imported into OpenTRICK.

Import

The import measures collection function allows you to import a new standard or collection of best practice that is still not included in the knowledge base of OpenTRICK.

To do so, you must click on the “Import” button. A new window pops up which allows you to select and upload a file that includes the measures collection to import. The import file and included information must match an exact format which is provided in the import template.

Import of a new measures collection.

Delete

This functionality allows the deletion of the selected measures collection by clicking on the “Delete” button.

Impacts

The section “Impacts” allows you to add impact categories to the knowledge base of OpenTRICK. These impact categories can be reused in risk analyses.You have the possibility to “Add”, “Edit” and “Delete” impact categories.

Add/edit impact category.

When adding impact categories, you have to indicate:

Analysis profiles

This view shows a list of analysis profiles, which act as templates for risk analysis. During the creation of a new risk analysis a risk analysis profile can be selected as basis. This allows creating risk analysis from templates that already include some parameters and characteristics which then do not have to be recreated from scratch.

Three profiles (one for quantitative risk analyses, one for qualitative risk analyses and one for mixed risk analyses) are set as default. These profiles will be used for the creation of a new risk analyses if no other profiles are selected.

You have the possibility

How to create a new profile is explained in [Section].

Analysis

The Analysis page shows you a list of all current analyses. Using the drop-down lists in the centre of the screen (see [Figure]), you can easily filter the analyses by customer and analysis name.

All Analyses.

When no analyses are selected in the list, you can do the following:

When an analysis is selected in the list, you can do the following:

Further documentation for these actions can be found in the following subsections.

Creating a new analysis

To create a new analysis, click on the “New analysis” button (see [Figure]).

Once you clicked on the “New analysis” button, the pop-up box depicted in [Figure] will appear.

Now you have two options:

Create a new analysis from scratch

The information required to create the analysis is the following:

Create a new analysis.

Create a new analysis by taking parts of existing analysis

If you want to reuse parts of existing analyses for creating a new one, click on the “Advanced” tab.

Create new analysis from existing analysis.

In the advanced tab, choose a customer and an analysis from which you want to pick some parts to be put in your new risk analysis. Now you get a list of existing versions of the risk analysis. To copy the parts you want to reuse, drag, and drop the version from which you want to copy parts in the corresponding fields on the right side.

Example of elements taken over from existing analyses.

You can copy the scope, the risk information (brainstorming), the parameters, the assets, the scenarios, the risk estimation, the used measure collections, the risk profile, and the implementation phases from the existing analysis.

Manage access rights

The button “Manage Access Rights” allows editing the access rights of other users for a risk analysis version. Select the version for which you want to change access rights and click on the “Manage Access Rights” button. A new window will appear where you can choose the appropriate access right level for the different OpenTRICK users (Note: only the users that have access to the associated customer will be listed). The changes will be saved by pressing the “Save” button.

Manage access rights for risk analysis.

Different access right level exists:

Note that you can only manage access rights of other users if you have yourself full access rights. The user that creates a risk analysis gets per default full access rights.

Inviting new users

For privacy reasons, the access right dialog will only list users that already have access to the customer related to the analysis. If access rights shall be granted to other users as well, invitations have to be used instead. The lower part of the dialog lists all currently invited people and the access rights that are granted (see [Figure]). The latter can be changed at any time. To add a new user, click the [+] button, and add his e-mail address into the text box. Invitations will be sent upon clicking “Save”. The targeted user will have to accept the invitation before he actually obtains the granted access rights. The pending invitations can be seen in the user profile, see [Section].

An invited user does not necessarily have to be registered on OpenTRICK. When he accepts the invitation, he will be asked to create an account, and he will obtain the granted access rights automatically.
Invitations to access a risk analysis.

Manage probe subscriptions

The button “Manage probe subscriptions” opens a dialog where the user can pick one or more probes to subscribe to. If a risk analysis has subscribed to a probe, all parameters that are dynamically set by the probes will be made available and periodically updated in the risk analysis.

Granting access to probe users for the selected analysis.
The risk assessments may change if they make use of any dynamic parameters. It is recommended that for archiving purposes, old versions of an analysis should unsubscribe from all probes.

New version

With the new version button, you can create a new version of the selected risk analysis. All data is copied from the old version to the new version. It is recommended to create new versions if data in a risk analysis is modified or updated. This allows the tracing the changes and reverting back to an earlier version if needed.

Information to indicate when creating a new version is the author name (per default the author text field is filled with the users first name and last name), the new version number (must be greater than the version number, the new version is based on) and a comment on what will be changed in the new version.

Add new risk analysis version.

After clicking on the “Save” button, the new risk analysis version will be created.

Properties

The “properties” button allows to modify the following information regarding the selected analysis:

Edit risk analysis information.

New profile

With the “New profile” button, you can create a new profile based on the selected risk analysis. A profile can be reused as basis to create new risk analysis. The list of available profiles can be found in the knowledge base (see [Section])

Note that no sensitive data are copied to a profile. The risk scenarios defined in the selected risk analysis will be taken over and the user has the possibility to choose which security measures collection should be included in the new profile:

After providing a name to the profile to create, you can add the new profile to the knowledge base by clicking on “Save” the button.

The newly created profile can be viewed in Analysis profiles in the knowledge base

Create new risk analysis profile.

Updating analysis profile

There are two ways to update an analysis profile:

Updating an analysis created from analysis profile

Create: A new analysis can directly be created from a risk profile by clicking “New analysis” in the analyses overview, and by choosing the desired profile from the select box in the dialog. See Figure [Figure]
Modify: Once the profile is available as a risk analysis, it can be modified like any normal risk analysis. Set-up scenarios, adjust risk reduction factors (RRF), import measures.
Re-import as profile: When all modifications have been made, the risk analysis needs to be converted back to a profile. In the analyses overview, select the analysis that shall be converted, and select “New profile” from the menu – see Figure [Figure]. A dialog opens for setting up the profile. Type a name under which the profile shall be known as. It is highly recommended to add a version number to the name, so as to distinguish it from older versions later on. Indeed, neither the history nor the version of the underlying analysis will be copied over to the profile! Tip: If for some reason you do not want or have version numbers in the name, first rename the old profile (e.g. name it “ … (old)”), and then create the new profile. The reason for that is because OpenTRICK does not allow multiple profiles with the same name. Then, select all measure collections that shall be imported by default in all risk analysis based on the profile. Note that it is preferred to include measure collections in the profile, as this will also include all RRF values associated to the measures! RRF values are stored in a risk analysis/profile, not in the knowledge base.
Cleanup: When the profile has been successfully created, make sure to remove any older profiles from the knowledge base.

Note: Profiles which have been set up as “default” cannot directly be deleted. First set the newly created profile as “default”, before the old one can be deleted. It is recommended, however, to keep the underlying analysis (not profile) in OpenTRICK.

Create a profile from a risk analysis.
Choose a profile as a basis for a new risk analysis.

Exported as an SQLite file from the knowledge base

A profile can be exported as an SQLite file from the knowledge base – see Figure [Figure] That file can then be imported like a normal analysis into OpenTRICK for editing. It will become an analysis after import.

Export risk analysis profile.

Import

The Import page allows importing an SQLite database including a risk analysis into OpenTRICK.

The selected file must be an SQLite database that has been previously exported from (any) OpenTRICK instance. Backwards-compatibility is guaranteed.

Importing an analysis.

The analysis is imported for the customer that is currently selected (as a filter) in the analyses overview.

Export the database

With the “Export the database” button, you can export the selected risk analysis. The exported file is an SQLite database file including all data of the risk analysis. The exported file can be used as backup or to import it in another OpenTRICK instance (e.g.: locally installed OpenTRICK).

Export a report

The “Export a report” button is a short-hand method to generate the exhaustive Word report for the selected analysis. This button is equivalent to opening the analysis, and exporting the report from within the analysis.

Archive

To archive a selected analysis you can use the "Archive" button which this will disallow any future changes of the analysis.

Delete

You can delete a risk analysis by selecting the risk analysis and clicking on the “Delete” button.

Risk evolution

The risk evolution page offers the possibility to visualise the evolution of risk over a period by selecting different risk analysis versions. To do so, you must select a customer, a risk analysis, and a risk analysis version.

Risk evolution.

Profile

The profile page can be accessed from the username button on the right-hand side of the ribbon. The profile page includes five different sections:

My profile

This section includes the information related to your profile and allows updating the user information and changing the password.

Information that can be changed are:

The username and roles attributed to the user cannot be modified by the user.

This section also allows to see the Authentication type (Standard – User & password, LDAP or both) and the role to which you have been granted permission.

My Credentials

In this section you can "Add" and "Edit" your credentials. Click on "Add" button.

Add New Credentials.

In the add new credential window, you have two options for creating credential for the customers for accessing the Ticketing system (Jira/Redmine/Email): Token or Password.

List of Credentials.

You also can edit a credential by selecting the credential and click on the "Edit" button and save your changes. To delete a credential, you can select the credential and click on "Delete" button.

My invitations

This sections shows all risk analyses which the user got invited to access (see [Figure]). In order to access the risk analysis, the user must first accept the invitation by clicking on the “Accept” button. Alternatively, he can also deny by clicking the “Deny” button.

List of pending invitations.

My sqlites

When exporting a risk analysis from OpenTRICK, a copy of the exported SQLite file is stored on the server hosting TRICK Service. This has several reasons:

As mentioned you can download or delete the SQLite files of the list by clicking on the buttons within the action column.

My reports

As for the “My sqlite” section (see [Section]), you can find in the “My reports” section a list of all exported risk analysis reports. When exporting a word report, a copy of the report is stored on the server hosting OpenTRICK. This has several reasons:

You have the option to delete a report or to download it again by clicking on the corresponding buttons in the action column.

My sign-in settings

Sign-in settings for enabling Two-Factor Authentication.

In the sign-in settings you can enable or disable the Two-Factor Authentication (2FA) for your account.

When you enable 2FA by clicking the respective button, all subsequent logins will require you to confirm your identity by enforcing you to enter a security code that is sent to your e-mail address. See [Section] for further details on the Two-Factor Authentication process.

Enabling 2FA for mobile devices

When you additionally enable the “Use mobile application” feature, you additionally have the option to enter a one-time password when you log in, that is generated each time by your mobile device.

The procedure to enable 2FA for your mobile consists in the following:

Administration

You can only view and access the administration page if you are assigned to the role of an administrator or supervisor.

The different sections and functionalities of the admin page are explained in the following.

Status

The status section provides information about the installed version of OpenTRICK and the option to reinstall OpenTRICK. This re-initialises the database and removes all data.

Install status of OpenTRICK on the admin page.

Users

The Users section includes a list of all OpenTRICK users. Further options of this section are adding, editing or deleting a user. The different options are explained in the following subsections.

User section on the admin page.

Each user has different roles attributed. Existing roles are:

The different roles have different degrees of access rights which are illustrated in the table of “Annex A – OpenTRICK user roles”.

A user can be enabled or disabled. A user that has the status “Disabled” cannot login anymore to OpenTRICK. A user can be disabled if all roles of the user are revoked.

Add

Two possibilities exist to add a new user:

After clicking on the “add” button, a new window will appear requesting some information about the user to add. Required information are:

After all information have been provided click on the “Save” button to create the new user.

Add a new user.
It is preferable that the new user signs himself up on the login page. By doing so, the user credentials do not need to be communicated to the user and the related risks can be avoided.

Edit

To update user information, select a user and click on the “Edit” button. All user information can be modified and saved by clicking on the “Edit” button.

Edit/Update user information.

Delete

A user can be deleted by selecting the user to delete and clicking on the “Delete” button.

Probes

This section lists all Probes that have access to OpenTRICK. In contrast to a regular user, a probe can only access the OpenTRICK API (see Annex B) but not the web interface. Just as for regular users, it will also need additional access rights for every analysis it wants to connect to (see [Section]). Click on "Add" button, you can add a new probe. In the "Add new probe" window, you should enter a probe prefix, a decription and enable/disable the "Allow access" and click on "Save" button. The token will be created automatically.

Managing Probes users.

The displayed values are the following:

Entering this token in the powershell client the probe is able to change dynamic parameters..

When checking a user, the “Edit”, “Renew” and “Delete” buttons will become available.

The “Renew” button permits to assign a new access token to the selected probes user.

When editing or adding a new user, the “Name”, “Description” and “Status” properties (as described above) can be changed.

Customers

The customers section includes a list of all customers. Further options of this section are adding, editing, manage customer users or deleting a customer.

The options “Add”, “Edit” and “Delete” are explained in [Section]. The option “Manage customer users” is explained in the following subsection.

Customer section on admin page.
The “Profile only” option is used to define a customer that is linked to the risk analysis profiles. At most one customer can be defined as “Profile only”.

Manage customer users

With the “Manage customer users” option it is possible to define which user is assigned to which customer. Note that this still does not provide access to the different risk analysis of a customer but only the right to see the customer.

By selecting a customer and clicking on the “Manage customer users” button, a new window appears where the different users can be selected for having access to a customer.

Manage customer users.
The access rights to a risk analysis have to be set either by an administrator/ supervisor in the “All Analyses” section on the admin page (see [Section]) or by a user having full access rights on a risk analysis on the “Analyses” page (see [Section]).

Manage customer report templates

Selecting a customer (only can be activated for the customers that are linked to the risk analysis profiles "profile only" ), you can click on "Manage customer report template" button to "Download" or "Edit" selected templates in the list.

Manage customer template.

Managing customer ticketing system

A customer can be authorised to one of three ticketing systems (JIRA/Redmine/Email). In order to enable one of these ticketing system select Edit after selecting a customer and then select the appropriate ticketing system (see [Figure]):

Update the customer for a specific ticketing system
Managing customer ticketing system Redmine/Jira

This section describes the process of configuring the redmine ticketing system. Both redmine and jira ticketing system need to be configured in similar manner.

  • Administrator confiuration step: Select Redmine as ticketing system for the customer. (see [Figure]).
  • User confiuration Step: Goto Redmine url with credentials of the email id of the customer provided in the previous step. In the redmine accounts page create an api access key and fetch the same for the next step (see [Figure]). Choose the customer as well.
  • User confiuration Step:Goto TrickService with credentials of the email id provided. In the user accounts page click on My Credentials and choose add for adding a token (see [Figure]). Provide the token obtained from redmine in previous step to the value field.
  • User confiuration Step: This step involves linking the appropriate analysis to redmine project. Select the Analysis and click on Link to Redmine for the appropriate analysis. In the dialog box that appears select the project in redmine to link to OpenTRICK analysis (see [Figure]).
  • Fetching redmine access key
    Add the token fetched from redmine to OpenTRICK

    After the analysis is configured and linked to redmine project user can go ahead and create and update tickets (see [Section])

    Managing customer ticketing system Email

    If email ticketing option is selected then an email template needs to be additionally set for the customer. In order to do this select the customer and Click "Manage email template for ticketing system" [Figure]. Edit the template in the dialog box that appears [Figure]

    Email template ticket creation with text format
    Email ticket creation with html format

    All analyses

    The “All analyses” section includes a list of all analyses of the different customers. The different risk analyses of the different customers can be shown by selecting a customer in the analyses filter positioned on the top of the list.

    Options related to this section are managing the access rights towards the risk analyses of the different customers, the option to switch an analysis to another customer and the option to delete risk analyses.

    “All analyses” section on admin page.

    The manage access rights option functionality works the same as the one explained in [Section].

    To delete a risk analysis, select the risk analyses to delete and click on the “Delete” button.

    To switch an analysis to another customer, select the analysis and click on the “Switch customer” button. Next, select the new customer to which the risk analysis should be moved to and click on the “Save” button.

    Move analysis to another customer.

    To switch the owner of an analysis, select an analysis and click on the “Switch owner” button. Next, select the new owner and click on the “Save” button.

    Switch the owner of an analysis.

    Settings

    On the settings section, you can:

    Additional OpenTRICK settings.

    Broadcast center

    The broadcast center lists all notifications that are sent to all users of the platform (see [Figure]). The notification will appear in the lower right corner of the screen, when a user visits the platform. See [Figure] for an example.

    Broadcast center.
    A notification triggered by an administrator.

    A new notification can be scheduled by clicking the “Add” button. Existing notifications can be edited or deleted by clicking the appropriate buttons in the upper right corner of a notification (see [Figure]). When creating/editing a notification, a dialog as depicted in [Figure] appears. An administrator can then specify:

    Creating/editing a notification.

    Logs

    The “Logs” section includes an interface that allows an administrator to access and consult OpenTRICK log entries.

    Runtime

    The “Runtime” menu is only meant for internal use. It provides functionalities to upgrade very old releases of OpenTRICK (before v2) to more recent versions.

    As of v2, the upgrade is automatic, so the tasks listed here are not required to be executed manually.This menu will be removed in future releases of OpenTRICK.

    Logout

    The Logout button on the far right-hand side of the ribbon can be used to log out of OpenTRICK.

    Creating a risk analysis using OpenTRICK

    This chapter provides information on performing a risk analysis using OpenTRICK. Once the user has loaded his risk analysis (cf. [Section]), the following page will be displayed:

    Risk analysis.

    [Figure] shows a second ribbon displaying the different options linked to a risk analysis. Although all the information is contained on a single page, this ribbon allows quick navigation quickly to the different sections, rather than continually having to scroll through all the information.

    History

    The first section, History, seen in [Figure] above, shows the evolution of the current risk analysis.

    The following sub chapters describe each of the other sections contained in the risk analysis ribbon. Any section which has a blue background colour is editable by clicking on it. Once the information has been inputted, the user can click anywhere on the screen outside of the edited section to record the change.

    Risk context

    The risk context tab has the following sub sections:

    Scope

    The first step of the risk assessment consists of defining the scope of the risk assessment. This section contains a table with two columns: “Description” and “Value”. The “Value” column should be edited by the user, based on the following information:

    Description of parameters in the scope table.
    Description Value
    Organisation type Type of the organisation: Government, agency, company…
    Profit type Profit type of the organisation (S.A., s.à r.l., etc.).
    Name of organisation The name of the organisation.
    Organisation presentation A short description of the organisation.
    Sector The business sector in which the organisation is active, e.g. public, financial, etc.
    Responsible The person(s) who is/are responsible for performing the risk assessment.
    Manpower Number of employees working for the organisation.
    Activities The services that the organisation provides to its customers.
    Business processes A list of the business processes which support the company in achieving its goals.
    Legal, regulatory and contractual requirements applicable to the organization Laws applicable to the organisation’s type, e.g. for a company that handles sensitive customer information this would include laws on data protection.
    The organisation’s information security policy Title of the organisation’s security policy including the date on which it was published.
    The organisation’s overall approach to risk management Title of the organisation’s risk management policy including the date on which it was published.
    Locations of the organisation and their geographical characteristics The address of the organisation and a brief description of the environment e.g. number of rooms in the building, private or shared building, etc.
    Various obligations Legal and contractual obligations of the organisation.
    Identification and analysis of the stakeholders Description of the stakeholders and their requirements.
    Establishment of the required relationships between the organisation and stakeholders The relationship between stakeholders and the organisation e.g. commercial, partnership, etc.
    Expectation of stakeholders What the stakeholders expect from the organisation.
    Socio-cultural environment Information regarding the environment in which the organisation operates, e.g. dynamic start-up company.
    Interfaces (i.e. information exchange with the environment) What interfaces does the organisation use to exchange information e.g. website, email, etc.
    Definition of roles and responsibilities The roles and responsibilities of the organisation’s employees. If the information is contained in a dedicated document, the title of the document should be indicated here.
    Definition of decision escalation paths in case of change of risks Description on how major decisions are made within the company in relation to security incidents.
    Development of the information security risk management process suitable for the organisation Brief description of the organisations risk management process.
    Specification of records to be kept A list of records which will be kept as part of the risk analysis.
    Excluded assets A list of any assets which are not in the scope of the ISMS.
    The organisation’s function and structure The structure of the organisation, e.g. board members, Managing Director, Heads of Departments, etc.
    Strategic objectives, strategy and politics The business strategy of the organisation including its objectives and goals.
    Financial parameters to define risk criteria Provide information related to the financial aspects taken into account for the definition of risk criteria.
    Risk evaluation criteria Definition of the risk evaluation criteria as defined by the organisation under analysis.
    Impact criteria Definition of the impact criteria chosen by the organisation under analysis.
    Risk acceptance criteria Definition of the risk acceptance criteria or reference.

    Parameters

    The parameters page includes the labels of probability/Impact scales, the risk acceptance threshold, CSSF parameters, various parameters and security maturity related parameters. Some of these parameters are only applicable for qualitative or mixed risk analysis..

    Labels of probability/impact scale

    This section allows the user to define the (short) labels for the different probability and impact scales used in the risk analysis. The labels are used throughout the risk analysis and the report. They are meant to be synonymous with the actual level value.

    Labels of Probability and Impact Scales

    Risk acceptance threshold (Qualitative risk analysis)

    The risk acceptance threshold is used to indicate the different levels of risks and what reaction is expected for risks of this level.

    Risk acceptance threshold.

    By clicking on the “Manage” button, the user can define different importance thresholds. By clicking on the “+” button, the user can add a new threshold. For each new threshold level, the user should indicate a label (name of the threshold, e.g. critical, high, medium, low), the upper limit of the threshold value, a description of the threshold indicating what should be done with risks associated with this level and a colour used in the risk heat map (see [Section]).

    Risk acceptance threshold management.

    CSSF parameters (Qualitative and Mixed risk analysis)

    For qualitative and mixed analysis, you are able to change the CSSF parameters:

    CSSF Parameters

    ILR SOA Scales Mapping

    The ILR SOA Scales mapping classify the level of compliance of a security measure based on the implementation rate of a security measure. By default the scale classification is as depicted in figure below. The threshold rates, description as well as color can be configured by double clicking the entries. In the ILR compatible JSON files these settings are used in "soaScaleComment" structure while exporting the JSON file for Serima. Refer ().

    Example of a quantitative probability scale.

    ILR Vulnerability Scale

    The ILR Vulnerability Scale Refer ([FIGURE]). This scale is used to define the levels of vulnerabilities in a qualitative risk estimation. For further details refer ([SECTION])

    Example of a ILR vulnerability scale.

    Report settings

    These settings allow configuration of color schemes which is used for the generated Reports for the current analysis

    Example of report settings

    Sequence numbers of exported documents

    These settings are used as prefixes of the file names/data exported from OpenTRICK

    Example of Sequence numbers of generated reports

    Various parameters

    The options of the “Various parameters” table are the following:

    Configuring Various Parameters.

    Probability & Impacts

    Probability scale

    The probability scale for quantitative risk analysis:Each level represents the yearly probability that a risk may occur. The values may be edited, depending on the preferences of the organisation on how to define the different probability levels (see figure below).

    Example of a quantitative probability scale.

    The probability scale for qualitative risk analysis:Each level is described qualitatively (see figure below)

    Example of a qualitative probability scale.

    The probability scale values are needed during the risk estimation step.

    Impact scales

    Qualitative risk analysis

    The impact scales section includes an impact scale for each type of impact selected during the creation of the risk analyses. The user can modify the labels and description of each impact level.

    Overview of qualitative impact scales.
    Quantitative risk analysis

    The following figure shows the default parameters for the total consequence scale:

    total consequence scale.

    Each level represents the impact that a risk may have on the organisation should it occur; ranging from insignificant to vital. In [Figure], all areas highlighted in blue are editable. The indicated values should be in accordance with the size and financial situation of the organisation.

    The impact scale values are used for computation during the risk estimation step.

    Dynamic probability parameters

    In order to do a quantitative evaluation modelling dynamic parameters can be added to the risk analysis.

    Setting dymamic parameters from power shell.
    Dynamic parameters view.
    Setting impacts based on dynamic parameters in Risk Analysis.

    Exclusion and reinclusion of dynamic parameters

    Exclude or reinclude dynamic parameters.

    Maturity parameters

    Only if you imported "Maturity" from the measures collection for the risk analysis:

    Maximal efficiency rate per security maturity level

    Finally, we can modify three tables regarding maturity level. The first maturity parameter table contains maximal efficiency rates associated with different security maturity levels. The following figure shows default values for these parameters.

    Maximal efficiency rate per security maturity level.

    Implementation rate of SMT

    The second maturity parameter table contains a scale for measuring the implementation rate of the different tasks in the different security maturity levels. The following figure shows the default values for these parameters.

    Implementation scale of SMT.

    Required level of implementation per SML

    The last maturity parameter table contains an overview on all tasks related to the different security maturity levels and indicates the needed implementation rate of the tasks to be compliant with a certain security maturity level. The following figures show default values for these parameters.

    Required level of implementation per SML.

    Risk analysis

    Brainstorming

    For identifying risks, OpenTRICK offers the possibility to perform a brainstorming on most common threats, vulnerabilities, and risk specificities. Based on the results of the brainstorming, it is easier to focus on domains where a high exposure level has been identified.

    Following the basic principle of OpenTRICK, only table cells that are highlighted in blue are editable. Each section contains a table containing 6 columns which are described below.

    Description of parameters in the risk information tables.
    Column Description Modifiable
    ID Unique identification number of the threat, vulnerability, or risk No
    Name Name of the threat, vulnerability, or risk No
    Acro An acronym of the characteristic (only for threats) No
    Expo The level of exposure to the threat, vulnerability, or risk; based on the MAGERIT scale Yes
    Owner Column used to indicate the risk owner Yes
    Comment A justification for the level of exposure that has been given Yes
    Hidden comment A comment that will not be shown in the final report, but may be useful for the user Yes

    The first sheet contains a description of the threats classified by source (Natural, Industrial environment, Internal error, etc.). The second sheet contains information about vulnerabilities which could be present on the assets of the organisation (Insufficient maintenance/faulty installation of storage media, Lack of periodic replacement schemes, Susceptibility to humidity, Dust, Soiling, etc.). The third sheet contains risk specificities, classifying risks by different types (Sources, Asset classes, Security aspects, Complexity, and Motive/cause).

    The user should systematically go through the three lists and provide an accurate exposure level for each of the risk types, threats and vulnerabilities. Double-clicking in the “Expo” column will provide the user with a drop-down list of exposure levels. The meaning of the different levels is explained in the table below:

    Qualitative risk exposure scale.
    Level Description Evaluation criteria
    – – Very Weak
    • Risk scenario is not applicable to the scope (e.g. risk of avalanche is only applicable for organisation located close to mountains);
    • No impact if risk occurs;
    • Adequate counter measures (preventive/ detective/ corrective) are implemented and maintained.

    Treatment:

    • No specific treatment needed.
    Weak
    • Probability of risk scenario occurrence is very low (e.g. risk of earthquake in a non-exposed region);
    • No or negligible impact if risk occurs.Adequate counter measures (preventive/detective/corrective) are implemented and maintained.

    Treatment:

    • No specific treatment needed.
    N Normal
    • Risk level is similar to other organisations active in the same sector;
    • Impact of risk occurrence could have negative effects on the business process(es) covered by the scope;
    • Adequate counter measures (preventive/detective/corrective) are implemented;
    • Company specific security measures are not required.

    Treatment:

    • Standard security measures of the ISO/IEC 27002 standard should be selected if economically justifiable.
    + Important
    • Similar risk scenarios already occurred in the past;
    • Impact of risk occurrence is not negligible;
    • No, or no adequate, counter measures are implemented, or are not maintained.

    Treatment:

    • Specific security measures must be selected and implemented to treat the risk scenario.
    ++ Very Important
    • Similar risk scenarios occurred recently;
    • Impact of risk occurrence would considerably harm the organisation;
    • No counter measures are implemented.

    Treatment:

    • Risk scenario must be quantified and specific security measures selected.

    The user should then provide a comment within the “Comment” column that justifies the level of exposure. The user may also choose to provide a second comment in the “Hidden Comment” column which will not be displayed in the exported report. It is not mandatory for the user to fill in this column however, in certain cases it may be necessary to add more useful information.

    Manage

    The content of each section (“threats”, “vulnerabilities”, and “risks”) can be edited. In the upper right corner, an option is available to change their content (also see [Figure]).

    Editing brainstorming sections through export, import, and manual editing.

    Click the “Manage” button to open a pop-up where quick changes can be made directly in OpenTRICK. Each entry has three associated buttons:

    Risk assessment

    Assets

    The assets section contains a table listing all assets that are within the scope of the risk assessment. In the ribbon above the asset table, the user has the following options: Add, Edit, Select, Unselect, and Delete.

    Adding an asset

    If there are no assets in the table already, the only option available to the user will be “Add”. To add an asset to the list, click on the “Add” button which will open the box seen in the figure below.

    Add new asset.

    The following information related to each asset should be indicated when adding an asset:

    Once all mandatory information is filled in (comments are not mandatory), click on the “Save” button, to add the asset to the asset list.

    Editing an asset

    Editing an asset can be done in two different ways:

    Select and unselect

    The “Select” and “Unselect” buttons are used to select which assets are to be included in the computation. Ticking the box next to an asset and then clicking the relevant “Select” or “Unselect” button will either include or exclude the asset from the risk analysis (it will not be displayed during risk estimation). If an asset in the list has a green background, it is included. If it has a white background, it is excluded from the computation. An orange background indicates that no asset value has been indicated (which is optional and not needed for risk computation).

    Deleting an asset

    To delete an asset, select the asset by ticking the box next to it on the left-hand side. Once the box is ticked, click the “delete” button in the ribbon to delete the asset from the list. All the assets in the list can be deleted together by ticking the box at the top of the far-left column to select all assets and then clicking “Delete”.

    Scenarios

    The scenarios table contains information regarding the different scenarios which will be considered for the risk analysis. By default, the table contains the following scenarios, shown in the figure below.

    ALE related columns are only shown for quantitative risk analyses.
    Table of scenarios.

    The table contains the following columns.

    Description of parameters in the scenarios table.
    Column Description Modifiable
    Ticking this box means the item in the row is selected, enabling the user to choose the various options from the ribbon menu above the table No
    # Each scenario is given a unique sequence number starting from 1 No
    Name The name of the scenario Yes
    Type The security aspect that relates to the scenario, e.g. confidentiality, integrity or availability Yes
    ALEP (k€) (Only for a quantitative risk analysis): The total Annual Loss Expectancy sum of the pessimistic risk estimation for the risk scenario in question. No
    ALE (k€) (Only for a quantitative risk analysis): The total Annual Loss Expectancy sum of the pessimistic risk estimation for the risk scenario in question. No
    ALEO (k€) (Only for a quantitative risk analysis): The total Annual Loss Expectancy sum of the optimistic risk estimation for the risk scenario in question. No
    Description A brief description of the scenario Yes
    Scenarios with ILR analysis enabled

    For a risk analysis for which the ILR analysis is enabled the scenarios table looks as below where the scenarios are mapped to additional ILR Threat and Vulnerability IDs.

    Table of scenarios with ILR anaalysis enabled.

    The different functionalities of risk scenarios are explained in the following sub-sections.

    Adding a scenario

    To add a scenario, click on the “Add” button which will open the box shown in [Figure].

    Adding a scenario.

    In this box, the following information should be entered:

    In addition to the risk types of confidentiality, integrity, and availability, the CSSF categorises risk types are as indicated in the table below. All the risk types contained in the table below can be selected from the risk type drop down menu when adding a scenario.

    CSSF risk categories.
    Type Direct/Indirect Name
    D1-Strat Direct Strategic risks/commercial policy
    D2-RH Direct Operational risks - Human resources
    D3-Processus Direct Operational risks - Processes
    D4-BCM Direct Operational risks - Continuity of operations
    D5-Soustrait Direct Operational risks - Cascade outsourcing
    D6-SI Direct Operational risks - Information systems
    D6.1-Secu Direct Information security
    D6.2-Dev Direct Acquisition, development and maintenance of systems
    D6.3-Expl Direct Operating procedures
    D6.4-Support Direct Technical support of information systems
    D7-Aut Direct Other relevant risk categories
    I1-Strat Indirect Strategic and governance risks
    I10-Aut Indirect Financial risks
    I2-Fin Indirect Legal and regulatory risks
    I3-Leg Indirect Operational risks - Human resources
    I4-RH Indirect Operational risks - Processes
    I5-Processus Indirect Operational risks - Continuity of operations
    I6-BCM Indirect Operational risks - Cascade outsourcing
    I7-Soustrait Indirect Operational risks - Information systems
    I8-SI Indirect Information security
    I8.1-Secu Indirect Acquisition, development and maintenance of systems
    I8.2-Dev Indirect Operating procedures
    I8.3-Expl Indirect Technical support of information systems
    I8.4-Support Indirect Risks related to a provision outside the financial sector
    I9-Prest Indirect Other categories of relevant risks

    In addition, by clicking on tab "Properties" you can define charactristics of your scenario.

    charactristics for a scenario.
    Edit / modify a scenario

    By selecting a risk scenario and clicking on the “Edit” button, you can modify all information related to the risk scenario. See [Section] for the description of the different fields that can be edited.

    Select / unselect a scenario

    By selecting one or multiple risk scenarios and clicking on the “Select” or “Unselect” button, you can define if a risk scenario should be considered during the risk estimation.

    Deleting a risk scenario

    To delete a risk scenario, select the risk scenario by ticking the box next to it on the left-hand side. Once the box is ticked, click the “delete” button in the ribbon to delete the risk scenario from the list. All the risk scenarios in the list can be deleted together by ticking the box at the top of the far-left column to select all assets and then clicking “Delete”.

    Risk estimation

    The risk estimation page is divided into two sections. The first section contains

    Sections of risk estimation page.

    The second section is used for risk estimation purposes that are explained in the following paragraphs.If you select an asset in the asset filter, you get an overview of all applicable risk scenarios. You now have the possibility to enter or modify risk related information directly in this view (all table cells with a blue background colour).If you want to indicate more detailed information, you must select a specific risk scenario from scenarios list (see figure below). Once you have selected a specific risk scenario, you get a risk sheet (an asset linked to a specific risk scenario).

    Risk sheet selection.
    Risk estimation with ILR information

    The risk estimation sheet additionally displays the ILR information as below:

    Risk estimation with ILR information.
    Risk sheet

    The risk sheet (see figure below), allows the user to provide detailed information about a specific risk.

    Risk sheet.

    The risk sheet contains the following elements:

    Risk treatment / compliance

    The Risk treatment / Compliance drop-down list includes two distinct sections:

    The following paragraphs describe the functionalities of both sections.

    Measures collections

    The measures collection section includes three elements:

    The different elements are explained in the following sections.

    Measures collections view of Risk treatment / Compliance drop-down list.
    View by collection

    By clicking on the “View by collection” option, the user get as page having a dropdown list of all measure collections available for the current risk analysis. By selecting one of the collections, all security measures of the collection are shown in a table view.

    The image below shows an excerpt of the ISO/IEC 27002 measure collection in OpenTRICK.

    Standards/measures – Table view.

    The security measures tables contain the following information:

    Description of parameters in security measures tables.
    Column Description Modifiable
    Reference (Ref.) The reference number, as defined by the relative standard No
    Security measure The title of the security measure No
    Status (ST.)

    Defines the status of applicability of the security measure. Here, the user can choose the following options from a drop-down list:

    • M (Mandatory): The security measure is required and will be implemented first. The measure will appear in SoA and in Action Plan;
    • AP (Applicable): The security measure is relevant and will be considered in the computation. The measure will appear in SoA and in Action Plan;
    • NA (Non-Applicable): The security measure is not relevant to the organization and will therefore not be considered in the computation. The measure does not appear in SoA and also in Action Plan;
    • EX (Excluded): The security measure is not relevant to the organization and will therefore not be considered in the computation. The measure does not appear in SoA and also in Action Plan;
    • OP (Optional): The security measure does not appear in SoA but appears in Action Plan;
    Yes
    Implementation Rate (IR (%)) The current implementation rate of the security measure. The user can enter a value between 0 and 100% Yes
    Internal Workload (IW (md)) Internal workload in man-days needed to achieve 100% implementation rate Yes
    External workload (EW (md)) External workload in man-days needed to achieve 100% implementation rate Yes
    Investment (INV (k€)) Investment: the cost in k€ to achieve 100% implementation rate Yes
    Lifetime (LT (y)) Lifetime of the security measure before it has to be re-implemented. If no value is indicated, the default value indicated in the various parameter section (see [Section]) is considered. Yes
    Internal Maintenance (IM (md)) Yearly internal maintenance workload in man-days to keep the implementation rate to 100%. Yes
    External Maintenance (EM (md)) Yearly external maintenance workload in man-days to keep the implementation rate to 100%. Yes
    Recurrent Maintenance (RM (k€)) Yearly recurrent maintenance costs (e.g. licences) Yes
    Cost (CS (k€))

    Cost: this is the annual cost in k€ of maintaining 100% implementation rate. The costs are computed with the following formula:

    CS = (IW * internal setup rate + EW * external setup rate + investment) / LT + IM * internal setup rate + EM * external
    						setup rate + RI

    The internal and external setup rates are defined in [Section].

    No
    Phase (PH.) The phase of the Risk Treatment Plan in which the action (To do) should be carried out Yes
    Importance (I.) The importance of recommendation suggested in To do column which suggests the recommendations to achieve 100 % implementation rate. The importance can be classified as:
    • L:Implying Low priority recommendation. The recommendation as defined in To do column is useful for the organizations security.
    • M:Implying Medium priority recommendation. The recommendation as defined in To do column currently suggestive of a best practise being missed or sugegsts a dedictated action to solve a vulnerability within the organization.
    • H:Implying High priority recommendation. The recommendation as defined in To do column is a priority recommendation and needs immediate attention.
    Yes
    Responsible (Resp.) Person responsible for the implementation of the actions defined in the “To do” column.
    To check Text box where user can indicate what he has still to check to verify implementation status of security measure. Yes
    Comment A justification of the information provided in the previous columns Yes
    To do If the security measure is applicable and not already at 100% implementation rate, an action should be defined in this column that will result in the organisation achieving 100% implementation rate. Yes
    Creating ticket by emails

    The measure by collection page (see [Figure]) provides the following intefaces for email ticket creation and updation:

    Email ticket creation and update options.
    Creating redmine tickets

    The measure by collection page (see [Figure]) provides the following intefaces for redmine ticket creation and updation:

    Redmine interface for collection measure
    View by Measure

    The “View by Measure” page consists of two areas. Area 1 represents the navigation pane, and Area 2 is the detailed view including the entry fields.

    The navigation pane allows the user to select a standard and a chapter, as awell as a security measure for that standard.

    Security Collections.

    The detail view contains the following information and entry fields:

    Column Description Modifiable
    Status

    Defines the status of applicability of the security measure. Here, the user can choose the following three options from a drop-down list:

    • M (Mandatory): The security measure is required and will be implemented first. The measure will appear in SoA and in Action Plan;
    • AP (Applicable): The security measure is relevant and will be considered in the computation. The measure will appear in SoA and in Action Plan;
    • NA (Not Applicable): The security measure is not relevant to the organization and will therefore not be considered in the computation. The measure does not appear in SoA or in the Action Plan;
    • EX (Excluded): The security measure is not relevant to the organization and will therefore not be considered in the computation. The measure does appear in SoA to provide a formal justification for exclusion, but no related measures will appear in the Action Plan;
    • OP (Optional): The security measure does not appear in SoA but appears in Action Plan;
    Figure depicting applicability of the security measures.
    Yes
    Implement. (%) The current implementation rate of the security measure. The user can enter a value between 0 and 100% Yes
    Internal Workload (md) Internal workload in man-days needed to achieve 100% implementation rate Yes
    External Workload (md) External workload in man-days needed to achieve 100% implementation rate Yes
    Investment (k€) Investment: the cost in k€ to achieve 100% implementation rate Yes
    Life time (y) Lifetime of the security measure before it has to be re-implemented. If no value is indicated, the default value indicated in the various parameter section (see [Section]). Yes
    Internal maintenance (md) Yearly internal maintenance workload in man-days to keep the implementation rate to 100%. Yes
    External Maintenance (md) Yearly external maintenance workload in man-days to keep the implementation rate to 100%. Yes
    Recurrent Maintenance (k€) Yearly recurring maintenance costs (e.g. licences) Yes
    Cost (k€)

    Cost: this is the annual cost in k€ of maintaining 100% implementation rate.

    The costs are computed with the following formula:

    CS = (IW * internal setup rate + EW * external setup rate + investment) / LT + IM * internal setup rate + EM * external setup rate + RI
    The internal and external setup rate are defined in the various parameter section of OpenTRICK (see [Section]).
    No
    Phase The phase of the Risk Treatment Plan in which the action (To do) should be carried out Yes
    Responsible Person responsible for the implementation of the actions defined in the “To do” column. Yes
    To check Text box where user can indicate what he has to verify the implementation status of security measure. Yes
    Comment A justification of the information provided in the previous columns Yes
    To do If the security measure is applicable and not already at 100% implementation rate, an action should be defined in this column that will result in the organisation achieving 100% implementation rate. Yes
    Manage collections

    The user is free to add further security measures collections from the knowledge base or remove measure collections if they are not needed in the current risk analysis. This can be done by clicking on the “Risk treatment / Compliance” drop-down list of the navigation bar and clicking on the “Manage collections” option under the “Measures collections” section.

    Open “Manage standards” interface.

    After this step, a new window appears, showing all measures collections included in the risk analysis.

    Several functionalities exist:

    Manage standards of a risk analysis.

    The user can delete a collection from the analysis by selecting the collection and clicking on “Delete” button. The “Edit” button can be used to edit the information of a custom security measures list (see section Create a custom security measure)

    Import a security measures collection from the knowledge base

    The user can add a new security measures collection from the knowledgebase by clicking on the “Import from knwledge base” button. In the new interface, the user can select a measures collection from the knowledge base and add it to the analysis by clicking on the “+” button.

    Add new standard from the Knowledge base.
    Create a custom security measure collection

    By clicking on the “Add” button (see [Figure]), a new window will appear. Now the user can indicate:

    After clicking on the “Save” button, the new security measure list will be added to the risk analysis.

    Add security measure in custom security measure list

    The following sections define how to add security measures to a custom security measures list. Section “Asset type related security measures” describes how to add a security measure to a security measure list that has influence on all risks of a specific asset type and section “Asset related security measures” (in the following)describes how to add a security measure to a security measure list that has influence on all risks of a specific asset.

    How to define the type of a custom security measures collection is described in section “Create a custom security measure”.

    Asset type related security measures

    First the user should select the custom security measure list from the drop down list of the “Measures by collection” view. Next, the user can add, edit or delete a custom security measure.

    Custom security measure list.

    To add a new custom security measure, the user should click on the “Add” button. A new form will be shown which consist of two tabs.

    For qualitative risk analyses, there exists only the first tab.
    Add new custom security measure – General tab.
    Add new custom security measure – Properties tab.

    After providing all information, the user can add the new custom security measure by clicking on the “Save” button.

    Asset related security measures

    First the user should select the custom security measure list form the drop down list of the “Measures by collection” view. Next, the user can add, edit or delete a custom security measure.

    To add a new custom security measure, the user should click on the “Add” button. A new form will be shown which consist of three tabs for a quantitative risk analyses and two tabs for qualitative risk analyses.

    The General tab and the properties tab are the same as for the asset type related security measures (see section “Asset type related security measures”)

    As the security measures should be linked to specific assets, the user can select the assets on which the custom security measure will have influence on, in the “Assets” tab. He can filter the assets by their type and select the asset by clicking on the asset in the list of assets. The selected assets will be shown on the “Selected assets” list.

    Add new custom security measure – Assets tab.

    After providing all information, the user can add the new custom security measure by clicking on the “Save” button.

    Implementation

    Implementation phases

    The “Phases” section gives the user the possibility to define implementation phases for the different security measures included in the action plan.

    List of implementation phases.

    The columns contain the following value:

    The user has the options to add, edit or delete implementation phases. These options are explained in the following paragraphs.

    By clicking on the “Add” button, the user get a new window where he can define a start and end date of an implementation phase. By clicking on the “Save” button, the new implementation phase will be added to the list of implementation phases.

    Add new implementation phase.

    To modify the start or end date of an implementation phase, the user should double click on the date field or select the phase to modify and click on the edit button.

    The start date can only be changed for the first phase. For all other phases, the start date is implicitly computed as the end date of the previous phase + 1 day.

    To delete an implementation phase, the user should select the implementation phase and click on the “Delete” button.

    If a phase is deleted, all other phases are updated such that the start date of each phase corresponds to the end date of the previous phase + 1 day.
    Action plan

    The security measures to be implemented will be displayed in the “Action plan” section. For the computation of the action plan and of the security measures to be implemented see [Section].

    A description of each column can be found in the table below.

    Description of parameters in the Action Plan table.
    Column Description Modifiable
    # A unique reference number designated to each of the actions in the list. No
    Collection This column references the security measures collection from where the clause relevant to the action is derived. No
    Reference The reference number of the security measure. No
    To do The action that should be performed to satisfy the requirements of the relevant security measure. No
    Number of Risks (NR) The number of risks that are applied to the current measure in the given analysis (only for qualitative risk analysis). No
    Annual Loss Expectatny (ALE (k€)) Annual Loss Expectancy (only for quantitative risk analysis) No
    Δ Annual loss expectatny (ΔALE (k€)) Delta Annual Loss Expectancy (only for quantitative risk analysis) No
    Cost (CS (k€)) The implementation costs of the security measure. No
    Return on Investment (ROI (k€)) The Return On Investment value (only for quantitative risk analysis). No
    Internal workload (IW (md)) The number of internal man-days needed to complete the action. No
    External workload (EW(md)) The number of external man-days needed to complete the action. No
    Investment (INV (k€)) The investment cost of completing the action. No
    Phase (PH.) The phase of the risk treatment where the action will be carried out. Yes
    Importance (I.) The importance of recommendation suggested in To do column which suggests the recommendations to achieve 100 % implementation rate. The importance can be classified as:
    • L:Implying Low priority recommendation. The recommendation as defined in To do column is useful for the organizations security.
    • M:Implying Medium priority recommendation. The recommendation as defined in To do column currently suggestive of a best practise being missed or sugegsts a dedictated action to solve a vulnerability within the organization.
    • H:Implying High priority recommendation. The recommendation as defined in To do column is a priority recommendation and needs immediate attention.
    Yes

    The user also has the option of viewing the ALE value evolution for each individual asset in the table by clicking on the “Show assets” button (only for quantitative risk analyses).

    With the “Compute” button, the user has the possibility to compute the action plan. After clicking on the “Compute” button, the user gets another window allowing him to indicate which security collection(s) he wants to take into consideration during computation. If no security collection is selected, all collections are by default taken into consideration (only for quantitative risk analyses).

    Compute action plan.

    Risk communication

    Statement of Applicability (SOA)

    The “SOA” section enables users to see for each security measure coming from the annex of ISO 27001, which couple asset/threat has the best reduction of ALE.

    The column “justification” allows the user to fill in some information regarding the measure and the asset/threat

    The last column “Reference” enables the user to give a reference to a document or any other type of support in evidence of the status of the measure.

    Action plan summary

    The action plan summary contains a breakdown of the action plan; allowing the user to visualise the key aspects of the action plan. The information contained in this section is described in the table below.

    None of the information in this table is directly modifiable as it is generated based on the information provided in the previous sections.

    Phase columns are generated depending on how many phases are intended to complete the risk treatment plan. The “Start (P0)” is based on the organisations current state, before any risk treatment has taken place.

    Description of the parameters in the action plan summary table.
    Phase characteristic Description
    Begin date The date on which the phase will begin
    End date The expected completion date of the phase
    Compliance … (%) Compliance rate of ISO/IEC 27001 & ISO/IEC 27002 security measures. Computed based on the average implementation rate of the security measures from a security standard.
    Non-compliant to … Number of measures that are not compliant with ISO/IEC 27001 or ISO/IEC 27002 requirements.
    Measures in phase (#) The number of measures which will be treated during the phase
    Implemented after (#)… The number of measures already implemented
    1. Profitability (only for quantitative risk analyses)
    1.1. ALE (k€)… at end Annual Loss Expectancy in k€ at the end of the phase
    1.2. Risk reduction (k€/y) The risk reduction in k€risk_reduction = ALE_previous_phase - ALE_current_phase
    1.3. Average yearly cost (k€/y) Average yearly cost of phase
    1.4. ROSI (k€/y) Return On Security InvestmentROSI = risk_reduction - annual_cost
    1.5. Relative ROSI Relative Return On Security Investmentrelative_ROSI = ROSI / annual_cost
    2. Resource planning
    2.1 Implementation costs
    2.1.1. Internal workload (md) of phase The total estimated internal workload in man-days needed for implementing the security measures planned to be implemented in the phase under consideration.
    2.1.2. External workload (md) of phase The total estimated external workload in man-days needed for implementing the security measures planned to be implemented in the phase under consideration.
    2.1.3. Investment (k€) of phase Total investments to be made during the phase under consideration.
    Total implementation costs of phase Total internal workload (md) of phase * Internal setup rate (€/md) + Total external workload (md) of phase * External setup rate (€/md) + Investment of phase
    2.2. Recurrent costs
    2.2.1. Internal maintenance (md) of phase

    The internal maintenance effort in man-days to keep the implemented security measures effective.The total of internal maintenance in man-days for each security measure to be implemented in the phases that precede the phase under consideration.

    As the internal maintenance is always indicated as yearly maintenance effort, the “internal maintenance effort of phase” is adjusted to the duration of the phase under consideration.Example: the internal maintenance of a security measure is 1 md per year and the implementation phase under consideration has only a duration of half a year, then the “internal maintenance effort of phase” is 0,5 md.
    Maintenance efforts are only considered starting from the phase that follows the implementation phase.Example: if in phase 1 we indicate an internal maintenance of 1 md, this will only appear in phase 2 as in phase 1, the security measure will be implemented and only starting from phase 2, the security measure has to be maintained.
    If the implementation rate is put to 100%, the internal maintenance will be taken into account starting from phase1.
    2.2.2. External maintenance (md) of phase

    The external maintenance effort in man-days to keep the implemented security measures effective. The total of external maintenance in man-days for each security measure to be implemented in the phases that precede the phase under consideration.

    As the external maintenance is always indicated as yearly maintenance effort, the “external maintenance effort of phase” is adjusted to the duration of the phase under consideration.Example: the external maintenance of a security measure is 1 md per year and the implementation phase under consideration has only a duration of half a year, then the “external maintenance effort of phase” is 0,5 md.
    Maintenance efforts are only considered starting from the phase that follows the implementation phase.Example: if in phase 1 we indicate an external maintenance of 1 md, this will only appear in phase 2 as in phase 1, the security measure will be implemented and only starting from phase 2, the security measure has to be maintained.
    If the implementation rate is put to 100%, the external maintenance will be taken into account starting from phase 1.
    2.2.3. Recurrent investment (k€) of phase

    Recurrent investments to make in order to keep implemented security measures effective.The sum of the recurrent investments for each security measure to be implemented in the phases that precede the phase under consideration.

    As the recurrent investment is always indicated as yearly recurrent investment cost, the “recurrent investment of phase” is adjusted to the duration of the phase under consideration (example: the recurrent investment of a security measure is 1 k€ per year and the implementation phase under consideration has only a duration of half a year, then the “recurrent investment of phase” is 0,5 k€.
    Recurrent investment costs are only considered starting from the phase that follows the implementation phase (e.g. if in phase 1 we indicate an recurrent investment of 1 k€, this will only appear in phase 2 as in phase 1, the security measure will be implemented and only starting from phase 2, the security measure has to be maintained.
    If the implementation rate is put to 100%, the recurrent investment will be taken into account starting from phase 1.
    Total recurrent costs (k€) of phase The recurrent costs of all security measures included in the phase (including internal and external maintenance costs).Total_recurrent_costs_of_phase = internal_maintenance * internal_rate + external_maintenance * external_rate + recurrent_investment
    Total cost (k€) of phase Total cost of phase = Total implementation cost of phase (k€) + Total recurrent costs of phase (k€)

    Risk register

    The risk register is specific to risk assessments which are conducted in the context of the CSSF risk analysis. Its purpose is to provide an overview of the most important risks (based on their potential impact) sorted by category.

    The OpenTRICK risk register can be used to provide the following information to the CSSF:

    Charts

    Compliance by measures collection

    The section “Compliance” graphically represents the level of conformance with the standards ISO 27001 & 27002 after the different implementation phases that have been defined.

    A chapter with all not-applicable measures will appear on the chart without conformance value, mentioned with (NA).

    Risk heat map (only for qualititative and mixed risk analysis)

    The risk heat map provides an overview of the number of risks per risk level. This allows, based on the risk acceptance thresholds, to see the number of risks that are currently not acceptable.

    [Figure] shows an example heat map. On the right hand-side, the risk acceptance thresholds are repeated for convenience (see [Section]). The left hand-side shows the heatmap table, each cell of which containing the number of risks that were specified for the given impact and probability level.

    Risk heat map.

    Below, the same heat map is displayed again, but this taking the evolution of risk into account. See [Figure] for an example. Each dot in the heatmap represents a risk with its net risk (the values specified in the “NET” row in [Section]). Arrows point to the new impact/probability levels (the values specified in the “EXP” row in [Section]). On the right hand-side, each risk can be individually shown/hidden by clicking on the respective name. For convenience, in the top right corner, you can also specify the number of risks you want to display (the top N are displayed in that case).

    Heat map showing evolution of risk.

    Risks by assets/asset types/scenarios/scenario types

    This section shows the number of risks (for a qualitative risk analysis) that are available for each of the assets/asset types/scenarios/scenario types.

    ALE by Asset/Asset Type (only for quantitative risk analyses)

    The chart section “ALE by Asset & by Asset type” includes two graphical representations. The first one shows the different assets with their Annual Loss Expectancy (ALE) value. The assets are ordered by the ALE value (highest ALE on first position).

    The second chart shows the ALE by asset type. All ALE of one type is summed up and the asset type with the highest sum of ALE is ordered on first position.

    ALE by Scenario/Scenario Type (only for quantitative risk analyses)

    The chart section “ALE by Scenario & Scenario type” includes two graphical representations. The first one shows the different risk scenarios with the sum of the ALE if the scenario occurs. The scenarios are ordered following the ALE sum knowing that the scenario with the highest ALE sum is represented on first position.

    The second chart shows the ALE by scenario type. All ALE of one type of risk scenario is summed up and the scenario type with the highest sum is ordered on first position.

    Evolution of profitability by action plan(only for quantitative and mixed risk analyses)

    The chart “Evolution of profitability and ISO compliance” shows how profitable the different implementation phases of the risk treatment plan are and how the compliance rate with the international standards 27001 and 27002 evolves.

    Budget by Action Plan (only for quantitative risk analyses)

    The budget chart presents a chart containing the needed budget per implementation phase of the security measures.

    Actions

    More advanced options can be found in the “Actions” menu (gear icon) on the right-hand side of the analysis ribbon (highlighted in red in [Figure] below). Its menu items are described in greater detail in the following sections.


    Action menu.

    Manual update

    Compute risk profile measures

    The Risk Profile measures are computed based on following three preconditions:

    The applicable measures for risk scenarios can be viewed in in the Risk Sheet in Collection, Ref., Security measure section. Refer ([Section]). As an example the Risk Sheet will be populated with Security measures like in the figure given below:

    Risk sheet with computed Security Measures

    Once the action plan is computed further. The qualitative action plan gets generated which contains consolidated measures of all the risk scenarios. The column NR displays the number of risks for a particular measure and I. denotes the importance associated with the measure. Refer figure below for a generated sample Qualitative action plan

    Qualitative action plan

    Compute action plan

    Once the all information has been entered into the relative tables, this option allows the user to compute the action plan (see [Section]).

    Reload charts

    Refreshes all charts in the risk analysis. This option should only be used in case there is a failure in the automatic update of the charts.

    Refresh estimations

    The update estimation option will recompute all ALE. This option should only be used when the automatic computation of the ALE failed.

    Export

    Clicking on “Export” will open the centralised export interface, from where most of the data entered into OpenTRICK can be exported to portable formats.

    Centralized export interface.

    The interface is structured as follows: on the right-hand side, the user can choose what shall be exported. The left-hand side of the interface will then show configuration options (if applicable), which are explained in the sub-sections below. As a final step, the data can be exported via the “Export” button in the lower right corner. See [Figure] for an illustration.

    Assets

    You can export all assets used in the risk analysis as an Excel file by click on "Assets" and then "Export" button.

    Brainstorming

    Export all data from all sheets from the “Brainstorming” section (see [Section]) into a single Excel file (with three sheets). The structure of the Excel file is the same as the one in OpenTRICK.

    ILR: JSON File for Serima

    This option allows users to export a risk assessment file in an ILR compatible JSON format. This generated JSON file can be further imported to Serima platform thereby ensuring cross tool compatibility.

    There are two mandatory inputs required to be provided during the import. Refer ([Figure]) below.

    Export as JSON
    JSON Export interface

    Steps for generating JSON File with Risk Treatment plan

    In order to export the JSON file containing the risk management plan with appropriate information of the recommendations, security measures, statement of applicability the following process must be carried out before exporting the JSON file from OpenTRICK:

    Risk estimations

    By clicking on “Export”, you will get an Excel spreadsheet that contains all likelihood and impact estimations for all assets and scenarios.

    Asset dependency

    Asset dependency matrix is a square matrix of size n x m where n is the number of assets where m <= n. The matrix value 1 indicates that the asset in the row is dependent on the asset specified in the column. A positive value in matrix between 0 to 1 indicates the probability of dependency between the assets. The matrix is asymmetric. The matrix is exported in the Dependency sheet of the exported file. The matrix is exported only if ILR analysis is enabled. This dependency matrix can also be imported using DRAW tool and then synchronized with OpenTRICK. For details refer Draw documentation.

      The C(confidentiality),I (Integrity),A(Availability) values of an asset are computed using Dependency Graph of the asset if the asset CIA values are not explicitly specified. The rules for computation of inherited CIA values of an asset is as below:
    1. If asset has CIA value explicitly specified then the same is considered as CIA value of the asset.
    2. If the asset doesn't have CIA value explicitly specified then the value of CIA is inherited from that of parent provided the parent is selected.
    3. If the asset doesn't have CIA value explicitly specified then the value of CIA is inherited from the grand parent if the parent is not selected.
    4. If Asset and its parent do not have explicit CIA value specified the value of asset node is inherited from the grand parent if there is a single parent.
    5. In case of multiple parents the asset node has CIA which is the maximum of the selected parent(s).
      NOTE: This propogation of CIA value from multiple parents to child is not aligned with Monarc where Monarc creates multiple child nodes having different CIA values under the different parent nodes. Open OpenTRICK on the other hand has a single asset instance which accounts for the difference. Refer example [Figure] for a basic example.

    Example of computation of Asset CIA values based on asset dependency.

    In contrast to the risk sheet, this spreadsheet can be imported back into OpenTRICK.

    Export risk estimation with-additional columns

    Given that ILR analysis is enabled the tool allows the user to add additional columns to the risk estimation exported file. The input can be provided using a dedicated CSV file in the file selection input box as below:

    Export as JSON
    Export interface
    The input file if provided in the above dialog box should be a CSV file specifying the formulas relative to Risk estimation sheets.
    Example of one such input CSV file could be:
    Relative Name; VLOOKUP(Risk_estimation[@[Asset]];Assets[#All];7;0)
    Label Th.;Risk_estimation[@Scenario]
    Pr;VLOOKUP(Risk_estimation[@[RAW Probability]];Probabilty[#All];3;0)
    The above file if provided will additionally add three columns 'Relative Name', 'Label Th.'' and 'Pr' in the exported risk estimation using the values in Tables 'Assets' and 'Probabilty' in the Risk Estimation file.
    NOTE: This feature is only available when the Enable ILR analysis is Set in Manage analysis settings.

    Risk reduction factors

    This option allows to export all RRF values of the different standards in Microsoft Excel format. This allows the user to modify more fast several RRF values. With the help of the Import option, the user can reimport and overwrite the RRF values again.

    The exported file is bound to the analysis and analysis version that it was exported from! Importing it to another analysis or version will fail. This choice has been been made to prevent accidental upload of bad data and potential data loss. If you absolutely want to copy the RRF values from analysis “A” to analysis “B”, you can always export the RRF values for both “A” and “B”, copy over the contents manually (in Excel) from the exported file “A” to the exported file “B”, and import file “B” into analysis “B”.

    Risk registers

    Click the "Export" button to export the risk register. The exported file is meant for compliance/documentation purposes, and cannot be imported back into OpenTRICK. If you want to re-import changes, consider exporting the risk estimations directly, instead.

    Risk scenarios

    The user can have list of scenarios in the risk analysis by clicking on "Export" button.

    Risk sheets

    This allows you to export a register of all the risks encoded in OpenTRICK. It is a summary of all of the risk estimations, arranged visually.

    Export risk sheet.

    The risk sheet can exported in two formats: as a Word report (for printing) or as an Excel file (for manipulation). The following options can be configured:

    The risk sheet is only meant for documentation/compliance purposes. It cannot be imported back into OpenTRICK! Consider exporting the risk estimations, instead.

    Scope

    Exports Scope of the risk analysis as an excel file. This scope can be viewed in Risk context->Scope tab

    Security measures

    Exports all security measures from the selected measure collections as an Excel sheet. Multiple standards can be selected using the SHIFT and CTRL keys on the keyboard.

    Word report

    By clicking on “Export”, the user will get a structured risk analysis report including all data of selected the risk analysis. The report is a word file including macros for the creation of charts & tables.

    Export risk analysis report.

    When exporting a report, you will be asked to select the template to use. The list features all templates deployed by default in OpenTRICK, and the templates that have been manually uploaded for the related customer (see [Section]). For mixed reports use bookmarks in the word template to set which aspects of the report are to be exported in "qualitative" and which are to be exported in "quantitative".

    You can also upload a previously exported report that gets automatically updated (even if styling or content changes have been made to the document).

    Word report using external template

    The word report can be generated using an external template as well. The external template if used can contain the following bookmarks as placeholders for TS reporting data:

    Description of bookmarks to be used in external template
    Bookmark Category Bookmark Name Description
    Common TS_RISK Table of Risk exposure estimation
    Common TS_SCENARIO Table of Considered risk scenarios.
    Common TS_SCOPE Table for general considerations on the target of the risk analysis.
    Common TS_THREAT Table for threat exposure estimation.
    Common TS_VULNERABILITY Table of list of vulnerabilities and its exposure level.
    Common TS_CURRENTSECURITYLEVEL No
    Common TS_LISTCOLLECTION List of security frameworks
    Common TS_MEASURESCOLLECTION Table of measures collection
    Common TS_DEPENDENCYGRAPH Exported Dependency Graph PNG from DRAW (see Export to OpenTRICK section in DRAW)
    Mixed TS_HY_ADDITIONALCOLLECTION Additional Collection
    Qualitative TS_QL_ACTIONPLAN Table of Qualitative Risk treatment plan
    Qualitative TS_QL_ADDITIONALCOLLECTION Qualitative Addtional Collection
    Qualitative TS_QL_ASSESSMENT Annual Loss Expectancy of assets
    Qualitative TS_QL_ASSET Table of List of assets considered in the risk analysis.
    Qualitative TS_QL_ASSETNOTSELECTED Table of List of assets not considered in the risk analysis.
    Qualitative TS_QL_IMPACT Table of Impact scale.
    Qualitative TS_QL_IMPACTLIST Table of list of Impact List
    Qualitative TS_QL_PHASE Risk treatment plan implementation phases
    Qualitative TS_QL_PROBA Table of Probability scale
    Qualitative TS_QL_SUMMARY Characteristics of implementation phases
    Qualitative TS_QT_ACTIONPLAN Qualitative Risk treatment plan.
    Qualitative TS_RISKACCEPTANCE Qualitative Risk acceptance
    Qualitative TS_RISKHEATMAP Risk heat map
    Qualitative TS_RISKHEATMAPSUMMARY Summary of Risk heat map
    Qualitative Charts TS_CHARTRISKBYASSET Chart of risks by assets
    Qualitative Charts TS_CHARTRISKBYASSETTYPE Chart of risks by asset types
    Qualitative Charts TS_CHARTRISKBYSCENARIO Chart of risk by Risk scenario
    Qualitative Charts TS_CHARTRISKBYSCENARIOTYPE Chart of risk by scenario type
    Qualitative Charts TS_QL_CHARTCOMPLIANCE27001 ISO/IEC 27001 compliance levels during the different implementation phases.
    Qualitative Charts TS_QL_CHARTCOMPLIANCE27002 ISO/IEC 27002 compliance levels during the different implementation phases.
    Quantitative TS_QT_ADDITIONALCOLLECTION Additional Collection
    Quantitative TS_QT_ASSESSMENT Quantitative assessement
    Quantitative TS_QT_ASSET List of assets considered in the risk analysis
    Quantitative TS_QT_ASSETNOTSELECTED List of assets not considered in the risk analysis.
    Quantitative TS_QT_IMPACT Quantitative impact
    Quantitative TS_QT_IMPACTLIST Quantitative impact list
    Quantitative TS_QT_PHASE Risk treatment plan phases
    Quantitative TS_QT_PROBA Probability Scale
    Quantitative TS_QT_SUMMARY Summary of treatment plan
    Quantitative Charts TS_CHARTALEBYASSET Chart of Annual Loss Expectancy by assets
    Quantitative Charts TS_CHARTALEBYASSETTYPE Chart of Annual Loss Expectancy by asset type
    Quantitative Charts TS_CHARTALEBYSCENARIO Annual Loss Expectancy by Risk scenario.
    Quantitative Charts TS_CHARTALEBYSCENARIOTYPE Annual Loss Expectancy by scenario type
    Quantitative Charts TS_CHARTRENTABILITY Chart Rent ability
    Quantitative Charts TS_QT_CHARTCOMPLIANCE27001 ISO/IEC 27001 compliance levels during the different implementation phases.
    Quantitative Charts TS_QT_CHARTCOMPLIANCE27002 ISO/IEC 27002 compliance levels during the different implementation phases.
    Table Styles TableTS OpenTRICK Table
    This feature is still experimental, though, and might not work as expected.

    Import

    Clicking on “Import” will open the centralised import interface, from where data can be imported back (again) into OpenTRICK.

    Centralized import interface.

    The interface is structured as follows: on the right-hand side, the user can choose what shall be imported. The left-hand side of the interface will then show configuration options (if applicable) and a possibility to select the import file. The options are explained in the sub-sections below. As a final step, the data can be imported via the “Import” button in the lower right corner. See [Figure] for an illustration.

    Assets

    The user can import assets that have been exported previously using OpenTRICK.

    Brainstorming

    Importing brainsorming can be done using two modes:

  • Overwrite:Clears all data from the sheets in OpenTRICK, and replaces it with the data contained in the provided Excel file (with three sheets). It is strongly recommended to use a previously exported file as a template.
  • Update:Update: If this mode is selected the import of a brainstorming excel sheet will not erase the existing values before the import. When this option is selected the values that have the same ID are overwritten.
  • Brainstorming export interface.

    Risk estimations

    Imports back previously exported risk estimations from an Excel spreadsheet. The format of the file is the same than the one exported by OpenTRICK ([Section]). Instead of starting from a raw file, consider exporting a file, adapting it, and importing it.

    Risk reduction factors

    The RRF values can be imported either from a previously exported file, or from the knowledge database (i.e., from another analysis). In either case, the RRF values will be replaced by those in the file/analysis for the selected standards.

    In the first case, the file must match the format of the file exported by OpenTRICK ([Section]). The RRF values for all standards contained in the file will be imported. When a standard is missing in the file, the related RRF values will remain unchanged in the analysis.

    In the second case, the user must select a risk analysis profile, or an analysis of a customer. In a seconds step, the user must select all standards for which he wishes to import the RRF values; multiple standards can be selected using the SHIFT or CTRL keys on the keyboard. When a standard is not selected, the related RRF values will remain unchanged in the analysis.

    Import of risk specificity values.

    Risk scenarios

    Imports back previously exported risk scenarios from an Excel sheet produced by OpenTRICK that can be edited manually before being imported.

    Scope

    Imports scope of the risk analysis which can be viewed under Risk context->Scope. There are two modes to import a scope:

    Scope import dialog.

    Security measures

    Imports back previously exported security measures from an Excel spreadsheet. The format of the file is the same than the one exported by OpenTRICK ([Section]). Instead of starting from a raw file, consider exporting a file, adapting it, and importing it.

    Risk reduction factor (only for quantitative risk analyses)

    The open RRF option opens the Risk Reduction Factor view where the user can define the risk specificities for the different risk scenarios and the influence of the security measures on risks of the current risk analysis.

    Risk specificities definition view.

    Edit text fields

    You can choose between “open” or “close” edit modes to open or close all text fields of the selected risk analysis.

    Settings

    Manage statement of applicability

    Shows a pop-up which permits the user to enable/disable the statement of applicability for the several security standards. If the statement of applicability is disabled for all standards, it will be hidden throughout the risk analysis. See ([Figure], [Figure]) showing how to enable SoA for a specific standard.

    Settings: Manage statement of applicability.
    Settings: Manage statement of applicability for a specific standard.

    Manage impact scales

    Shows a pop-up (see [Figure]) that allows the user to select all the impact scales (quantitative and qualitative) that shall be available in the risk analysis.

    If only the quantitative impact is included, then the analysis type will turn into “quantitative”, and all qualitative-related options will be removed.

    If only quantitative impact scales are included, then the analysis type will turn into “qualititative”, and all quantitative-related options will be removed.

    If both qualitative and quantitative impact scales are included, then the analysis type will turn into “mixed”, and all options will be available in the risk analysis.

    Removing an impact scale will permanently delete all associated risk estimations! It is strongly recommended to create a backup or a new version of the risk analysis before deleting impact scales!
    Change impact scales.

    Manage scale levels

    Shows a pop-up (see [Figure]) where the user can change the impact and probability scales.The dialog features two columns: the left hand-side displays the currently defined levels in the risk analysis (in the example: 3). The right hand-side contains the new levels. Click the “+” button to add an additional level to the scale. Drag an old level from the left and drop it onto a level on the right. All levels dropped onto a new level will be replaced by the latter. It is also possible to drop multiple levels from left into a single level on right reducing the levels. However when doing so consistency must be maintained else the outcome may not be predictable. Additionally levels on the right can be deleted reducing the number of scales.

    Change impact levels.

    Advanced settings

    Opens a dialog where advanced options can be shown or hidden for the risk analysis:

    Close analysis

    By clicking on the Exit symbol, the current risk analysis will be closed and the user will be redirected to [Section]. This option allows the user to close the current analysis without logging out of the application.

    Exit symbol.

    Annex A – OpenTRICK user roles

    The following table resumes the different access rights of the different user roles available in OpenTRICK. To see and modify the user’s roles, please refer to [Section].

    Page Group Action User Consultant Administrator Supervisor Comment
    Any Main Menu Home x x x x
    Any Main Menu Knowledge base x x x
    Any Main Menu Analysis x x x x
    Any Main Menu Import x x x x
    Any Main Menu Profile x x x x
    Any Main Menu Administration x x
    Any Main Menu Runtime x
    Any Main Menu Logout x x x x
    Knowledge Base Customers View x x x
    Knowledge Base Customers Add x x x
    Knowledge Base Customers Edit x x x
    Knowledge Base Customers Delete x x x
    Knowledge Base Language View x x x
    Knowledge Base Language Add x x x
    Knowledge Base Language Edit x x x
    Knowledge Base Language Delete x x x
    Knowledge Base Standards View x x x
    Knowledge Base Standards Edit x x x
    Knowledge Base Standards Show Measure x x x
    Knowledge Base Standards Get import template x x x
    Knowledge Base Standards Import standard x x x
    Knowledge Base Standards - Show Measures View x x x
    Knowledge Base Standards - Show Measures Change language x x x
    Knowledge Base Standards - Show Measures Add x x x
    Knowledge Base Standards - Show Measures Edit x x x
    Knowledge Base Standards - Show Measures Delete x x x
    Knowledge Base Analysis profiles View x x x
    Knowledge Base Analysis profiles Open Analysis x x x
    Knowledge Base Analysis profiles Set as default x x x
    Knowledge Base Analysis profiles Edit Info x x x
    Knowledge Base Analysis profiles Delete x x x
    Admin Status View x x
    Admin Status Install x x
    Admin User View x x
    Admin User Edit x x
    Admin User Delete x x
    Admin Customers View x x
    Admin Customers Edit x x
    Admin Customers Manage Users x x
    Admin Customers Delete x x
    Admin All Analyses View x x
    Admin All Analyses Manage Access Rights x x
    Analysis All Analyses View x x x x Only analyses enabled for the current user
    Analysis All Analyses New x x x x General: To create, at least 1 customer needs to be present, and 1 language and profile.
    Advanced: only analyses enabled for the current user with Read Right
    Analysis All Analyses Open x x x x Only analyses enabled for the current user with Read Right
    Analysis All Analyses Manage Access Rights x x x x Only analyses enabled for the current user + user has to be Owner or have All Right
    Analysis All Analyses New Version x x x x Only analyses enabled for the current user with Modify Right
    Analysis All Analyses Edit x x x x Only analyses enabled for the current user with Modify Right
    Analysis All Analyses Profile x x x x Only analyses enabled for the current user with Modify Right
    Analysis All Analyses Export x x x x Only analyses enabled for the current user with Export Right
    Analysis All Analyses Export Report x x x x Only analyses enabled for the current user Export Right
    Analysis All Analyses Delete x x x x Only analyses enabled for the current user with DELETE right
    Analysis Analysis View x x x x User has to have Read access on analysis
    Analysis Analysis Export x x x x User has to have Export access on analysis
    Analysis Analysis Modify x x x x User has to have Modify access on analysis
    Analysis Analysis compute action plan x x x x User has to have calculate action plan access on analysis
    Analysis Analysis compute risk register x x x x User has to have calculate risk register access on analysis
    Analysis Analysis delete x x x x User has to have delete access on analysis
    Analysis Analysis all x x x x User has to have all access on analysis

    Annex B – API

    OpenTRICK includes an HTTP/ReST API for providing external risk input to risk analyses, making them thus dynamic. External input is available as named parameters in a risk assessment, more precisely, in the “probability” field of every risk assessment.

    Use

    Before the API can be accessed, a dedicated “probe” needs to be created and enabled via the Administration interface (see [Section] for details). By default, the newly created probe does not have access to any risk analysis. In the risk analysis overview, click on “Manage probe subscriptions” (see [Section]) and select the probe you wish to subscribe to. Every risk analysis that is subscribed to a probe, gets automatically updated when the probe reports to the OpenTRICK API. Put differently, when a probe updates dynamic parameters via the API, all risk analyses that have subscribed to this probe will update their corresponding copies of the dynamic parameters to the given values. If you wish that dynamic parameters should no longer be updated for a certain risk analysis, unsubscribe from the respective probe via the “Manage probe subscriptions” interface (see [Section]).

    For performance reasons, the dynamic parameters are only updated once every 900 seconds (15 minutes). More precisely, if a value is reported via the API, it is first checked if an update of the dynamic parameters is already scheduled. If yes, nothing happens (the value will be handled in the scheduled update), otherwise an update is scheduled after 900 seconds. In particular, the dynamic parameters will only be updated 900 seconds after the first API call.

    HTTP requests

    API calls are made using secured HTTPS requests to OpenTRICK. If OpenTRICK is running on e.g. https://trickservice.itrust.lu, then the API calls should be made (usually via POST) to https://trickservice.itrust.lu/Api/<method_name>, where the available method names are listed below.Every HTTP request must have the following HTTP headers set:

    Accept: application/json;charset=UTF-8 
    Content-Type: application/json;charset=UTF-8
    X-Auth-Token: <api_token>

    Above, <api_token> should be replaced by the API token that is displayed in the probe administration ( [Section]). It is this token that is responsible for the authentication.The actual HTTP request body must be encoded in JSON. See the sections below for more details.

    Methods

    The OpenTRICK exposes methods which can be accessed using a HTTP client as described below. Parameters are passed to the API in the HTTP request body in JSON format (using the “application/json;charset=utf-8” encoding).The supported methods are explained in the following subsections.

    Setting dynamic parameters

    This method defines a new dynamic parameter that can be used in risk assessments.This method is called with HTTP “POST” and is available at /Api/ids/set.The expected parameters are of the form

    { "data": [ 
    { "c": <category>, "t": <time>, "v": <value> },
    ...
    ] }

    for arbitrarily many elements. The placeholders are to be replaced according to the table below.

    Placeholder JSON data type Description
    <category> String The name of the dynamic parameter to create/update.
    <time> Integer The timestamp when the parameter shall obtain the value. In most cases this value is now(). The timestamp is expressed as the number of seconds since 1 January 1970, 00:00:00 UTC (often called “UNIX timestamp”).
    <value> Floating point The ‘value’ of the parameter as a floating point number at the specified <timestamp>.

    Each line defines a parameter which has the given value starting from the given time and until the next timestamp for which a value was defined. For instance, if the API receives two requests that define (c=demo, t=0, v=5) and (c=demo, t=3600, v=10), then the parameter “demo” has the value 5 between 12:00am and 1:00am, and the value 10 starting from 1:00am.

    Reporting probe notifications

    This method accepts notifications (alerts) from external sources (such as intrusion detection systems) from which TRICK Service computes a risk level (from 0 to 1) that is available as a dynamic parameter in risk assessments. Each alert will raise the risk level: the higher the severity (see below), the higher the risk level will be raised. The risk level will slowly decrease with time (in an exponential fashion) again: the half-life (see below) of the alert affects how fast it will decrease.This method is called with HTTP “POST” and is available at /Api/ids/notify. The expected parameters are of the form

    { "data": [ 
    { "c": <category>, "t": <time>, "h": <halflife>, "s": <severity>, "n": <number> },
    ...
    ] }

    for arbitrarily many elements. The placeholders are to be replaced according to the table below.

    Placeholder JSON data type Description
    <category> String The name of the dynamic parameter to create/update.
    <time> Integer The timestamp when the alert was raised. In most cases this value is now(). The timestamp is expressed as the number of seconds since 1 January 1970, 00:00:00 UTC (often called “UNIX timestamp”).
    <halflife> Floating point The time after which the risk level shall have decreased to half of its value again. Must be positive and non-zero.
    <severity> Floating point The severity of the alert. Ranges from 0 (not important at all) to 1 (very important). Setting the severity to zero is equivalent to not notifying about the alert at all. Setting the severity to 1 will also raise the risk level to 1.
    <number> Integer The number of alerts that have the properties specified above. This can be used to regroup alerts of the same kind; in general, ‘number’ is set to 1.

    Annex C – Glossary

    The table below provides a description of some of the terms used in this document.

    Term Description
    ALE Projected annual loss of money due to threats
    Asset Goods (physical, human, information…) having some value for the company
    MAGERIT Method of risk analysis with two immediate objectives: to study the risks affecting a specific information system and its environment; and recommend appropriate actions to be adopted to detect, prevent, reduce or control the investigated risks.
    Threat Action (a virus deleting data, a fire destroying the company’s premises, human malevolence deleting data...) which may impact an organisation’s assets.
    Measures Implemented security means to avoid threats or to reduce the risks
    Threat probability Probability of risk occurrence, for one year
    ISMS Information Security Management System (defined in ISO/IEC 27001)

    The table below lists the acronyms relevant to the current document.

    Symbol Explanation
    ALE Annual Loss Expectancy
    ALEO Annual Loss Expectancy Optimistic
    ALEP Annual Loss Expectancy Pessimistic
    AP Applicable
    API Application programming interface
    CS Cost
    CSSF Commission de Surveillance du Secteur Financier
    EW External Workload
    HW Hardware
    IEC International Electrotechnical Commission
    INV Investment
    IR Implementation Rate
    ISMS Information Security Management System (defined in ISO/IEC 27001)
    ISO International Organization for Standardization
    IV Immaterial Value
    IW Internal Workload
    LH Likelihood
    LT Lifetime
    MT Maintenance
    NA Non-applicable
    PDF Portable Document Format
    RA Risk Assessment
    ROI Return On Investment
    ROSI Return On Security Investment
    ReST Representational State Transfer
    RRF Risk Reduction Factor
    SME Small and Medium Enterprise
    SML Security Maturity Level
    SMT Security Maturity Task
    SOA Statement of Applicability
    ST Status
    SW Software
    TRICK Tool for Risk management of an ISMS based on a Central Knowledge base
    RAR Risk Analysis Report

    Annex D – Changelog

    What's new in OpenTRICK 2.18

    What's new in OpenTRICK 2.17

    What's new in OpenTRICK 2.16

    What's new in OpenTRICK 2.15

    What's new in OpenTRICK 2.14

    What's new in OpenTRICK 2.13

    What's new in OpenTRICK 2.12

    What's new in OpenTRICK 2.11

    What's new in OpenTRICK 2.10

    What's new in OpenTRICK 2.9

    What's new in OpenTRICK 2.8

    Annex E – Frequently Asked Questions

    How to start using OpenTRICK and create first risk analysis

    Create a new account

    The first screen after the user installs the application is as below where a new account needs to be created.

    Create a new account.

    Setup the account details and the password information in screen below.

    Create a new acccount screen.

    Install OpenTRICK

    Before proceeding further the OpenTRICK needs to be installed and initialized. Follow the Administration menu and install OpenTRICK.

    Initialize or install OpenTRICK.

    Create a new Risk Analysis from default profile

    Prerequisite for creating a new risk analsis is existence of customer/company for which the Risk analysis is to be created.

    Create a new customer

    Select the menu "Knowledge base" and within it the Tab "Customers". Add a new customer as shown in screen below. Once the customer is added the same must be displayed in customer list.

    Create a new customer.
    Customer list.

    Create analysis

    Refer Create a new risk analysis for creating a new risk analysis.

    How to create a Risk Analysis from an existing Risk analysis

    Once a risk analysis is created, a new risk analysis can be created from it by using the same Risk Analyis or parts of it. Refer Create a risk analysis by taking parts of it.

    How to share analysis with another user

    Often, an analysis needs to be shared with multiple people who have different access rights. If someone cannot view the analysis, it is likely because they do not have the necessary access permissions. Refer Manage access rights and Inviting new users

    How to upgrade the measure collection to a new version of standard

    Preliminary Steps

    Import security standard

    In order to import a security standard into OpenTRICK, a file with a special format has to be provided. A template for such a file can be obtained directly in OpenTRICK, see [Figure] Alternatively, another standard can also be exported, and the obtained file manipulated accordingly.

    Either way, make sure that the [Name] and [Version] columns in the “NormInfo” sheet are changed appropriately! Otherwise, data from another security standard will be overwritten (if it has the same name/version) – which will also reflect on all analyses that use this standard!
    It is recommended to always have back-ups (obtained via export) of all standards in the knowledge base.
    Getting the template for importing new security standards.
    Double-check that the content of the “NormInfo” sheet is correct. Then click the “Import” button to import the file into OpenTRICK.
    In order to avoid accidental data loss, the import will only append/update data – never delete data. If you accidentally import a bad measure through the import interface, there is no way for a normal user to remove it again – only OpenTRICK administrators are allowed to delete such measures (and risk data loss).

    Back-up

    As for any task that involves the manipulation of a lot of data, it is highly recommended to create a new version of the analysis that shall be migrated. It will serve as a back-up in case something goes wrong.

    Create a new version of the analysis.

    Upgrade risk analysis to use new standard

    The migration consists of the following steps

    Note that due to technical limitations, it is not possible at the moment to reference multiple versions of the same standard in the same risk analysis. Therefore, when adding a new version of a standard to the risk analysis, the old version must be removed first.

    Exporting the data for the old standard

    To export the estimations for a security standard, open the Advanced Menu (see Export menu) and click “Export”. In the export interface, choose “Security Measures” and select the old standard, then export. The exported Excel file contains all cost and workload estimations that have been entered into OpenTRICK.

    Export menu.

    Upgrading to the new standard in the risk analysis (structure only)

    If the new version of the standard has been imported into the knowledge base, then it can be added to the risk analysis. Inside a risk analysis, click “Manage collections”, see Figure below.

    Get list of references in use by the analysis.
    A pop-up will appear which shows all currently referenced security standards. First, the old standard needs to be removed from the risk analysis. Note that this will also wipe all data (cost estimations etc) that is associated to it – which should have been exported by this point ([Section]). This action will not affect the knowledge base! Select the old standard from the list, click the “Delete” button, and confirm – see Figure below.
    Remove a standard from a risk analysi.
    Add reference to a standard stored in the knowledge base.

    Exporting a template for the new standard (structure only)

    The migration will be done manually in Excel by copying values from an export file to an import file. The import file (or a template thereof) can be obtained by repeating the steps in ([Section]), but this time for the new standard.

    Copying the values from the first export file to the second one in Excel

    When all steps have been carried out, the data can be migrated. At this point ensure the following:

    Open the two exported files – one for the old standard, and one for the new standard – in two Excel windows side by side. In the following, the file representing the old standard is referred to as [OLD], and the file representing the new standard is referred to as [NEW]. Then migrate the data as follows:
    1. Add a new column to the left of column A in [OLD].
    2. Copy the column A from [NEW] to the newly added column in [OLD].
    3. In [NEW], go through each line. Three cases can occur:
      1. The cells in columns A and B match: in that case, do nothing
      2. The content of the cell in A does not occur in the entire column B: in that case, move down all rows of columns BCDEF… by one row, starting from the current row (see [Figure]).
      3. Move down columns BCDEF… by one, starting from row 39, to match column A.
      4. The content of the cell in B does not occur in the entire column A: in that case, move down all rows of column A by one row, starting from the current row (see [Figure]).
      5. Move down column A by one, starting from row 27, to match column B.
    4. Go through all rows RA that have an empty cell in column A; those represent the IDs present in the old standard, but no longer in the new one.
      1. Check if the security measure has obtained a different ID in the new standard, in which case there is a corresponding empty cell in some row RB in column B.
      2. If yes, move the remaining cells on row RA (columns CDEF…) to the corresponding new row RB.
      3. In any case, delete the row RA.
    5. Go through all rows that have an empty cell in column B; those represent the IDs present in the new standard, but not yet in the old one
      1. Insert default data into the cells in columns CDEF… This default data can for example be copied from [NEW].
      2. Copy the content (that is, the ID) from the cell in column A to the cell in column B.
    6. Copy the entire table from [OLD] to [NEW].
    7. Save [NEW]. The changes in [OLD] can be discarded

    Importing the second file back into the analysis

    Once the manual migration is done, the [NEW] file can be imported into OpenTRICK. Open the import interface (see [Figure]), select “Measures”, pick the [NEW] file and upload it to OpenTRICK.

    Import menu.

    How to update an analysis profile

    Refer [SECTION] which details the process how to update an analysis profile to be reused for creating new analysis later. Also refer [SECTION] to understand the analysis profile view.

    How to show the ILR data

    TODO after the code changes in place.

    How to create ILR compatible JSON file

  • Updating the risk analysis parameters and settings See
  • Exporting the JSON file> See
  • How to debug an internal error

    Encountering an internal error could be difficult to resolve and may require to debug the tool, however in certain cases it is useful to check the generated logs for any helpful tips. Select "Administration" and then the "Logs" Tab to access the application logs to see a possible diagnosis.

    Settings: Accessing Logs
    Viewing logs for a possible diagnosis

    How to rename Asset from TRICK Interface

    Refer section [SECTION] for performing editing or renaming operations on an asset using the TRICK interface

    How to rename Asset and Scenario from Excel

    The best way to handle this is making changes to asset name in the OpenTRICK interface so that the corresponding scenarios are applied to the renamed assets. However there may be situaions when the change is needed to be made in excel instead and further the analysis is imported to OpenTRICK.

    Example rename assets in excel.
    Example rename scenarios in excel.

    How to enable Statement of Applicability for Risk Analysis

    If the statement of applicability is disabled for all standards, it will be hidden throughout the risk analysis. In order to enable SoA for a specific standard Refer [SECTION].

    How to manage impact scales for Risk Analysis

    The "Settings" menu allows the user to set impact scales by selecting "Manage impact scales". Refer [SECTION]

    How to manage scales levels for Risk Analysis

    The "Settings" menu allows the user to set impact levels by selecting "Manage scale levels". Refer [SECTION]

    A user analysis can be linked to a ticketing system, however it requires an initial token and access granted by the system administrator. Refer [SECTION]

    How to add a quantitative eval model to trick

    A quantitative evaluation model can be added to OpenTRICK by adding dynamic parameters to risk analysis.

    Setting dymamic parameters from power shell.
    Setting impacts based on dynamic parameters in Risk Analysis.

    How to use a macro enabled template

    In order to setup a risk estimation with additional columns involving formulas Refer [SECTION] . Additionally prior to exporting risk estimation involving formulas a Macro enabled Template requires to be setup for exporting analysis. Refer [SECTION] .