Score: 1

An Ontology-Based Approach to Security Risk Identification of Container Deployments in OT Contexts

Published: January 7, 2026 | arXiv ID: 2601.04010v1

By: Yannick Landeck , Dian Balta , Martin Wimmer and more

BigTech Affiliations: Siemens

Potential Business Impact:

Finds security problems in computer programs for factories.

Business Areas:
Identity Management Information Technology, Privacy and Security

In operational technology (OT) contexts, containerised applications often require elevated privileges to access low-level network interfaces or perform administrative tasks such as application monitoring. These privileges reduce the default isolation provided by containers and introduce significant security risks. Security risk identification for OT container deployments is challenged by hybrid IT/OT architectures, fragmented stakeholder knowledge, and continuous system changes. Existing approaches lack reproducibility, interpretability across contexts, and technical integration with deployment artefacts. We propose a model-based approach, implemented as the Container Security Risk Ontology (CSRO), which integrates five key domains: adversarial behaviour, contextual assumptions, attack scenarios, risk assessment rules, and container security artefacts. Our evaluation of CSRO in a case study demonstrates that the end-to-end formalisation of risk calculation, from artefact to risk level, enables automated and reproducible risk identification. While CSRO currently focuses on technical, container-level treatment measures, its modular and flexible design provides a solid foundation for extending the approach to host-level and organisational risk factors.

Country of Origin
🇩🇪 Germany

Page Count
12 pages

Category
Computer Science:
Software Engineering