An Ontology-Based Approach to Security Risk Identification of Container Deployments in OT Contexts
By: Yannick Landeck , Dian Balta , Martin Wimmer and more
Potential Business Impact:
Finds security problems in computer programs for factories.
In operational technology (OT) contexts, containerised applications often require elevated privileges to access low-level network interfaces or perform administrative tasks such as application monitoring. These privileges reduce the default isolation provided by containers and introduce significant security risks. Security risk identification for OT container deployments is challenged by hybrid IT/OT architectures, fragmented stakeholder knowledge, and continuous system changes. Existing approaches lack reproducibility, interpretability across contexts, and technical integration with deployment artefacts. We propose a model-based approach, implemented as the Container Security Risk Ontology (CSRO), which integrates five key domains: adversarial behaviour, contextual assumptions, attack scenarios, risk assessment rules, and container security artefacts. Our evaluation of CSRO in a case study demonstrates that the end-to-end formalisation of risk calculation, from artefact to risk level, enables automated and reproducible risk identification. While CSRO currently focuses on technical, container-level treatment measures, its modular and flexible design provides a solid foundation for extending the approach to host-level and organisational risk factors.
Similar Papers
A Systematic Mapping Study on Risks and Vulnerabilities in Software Containers
Software Engineering
Finds and fixes security problems in software containers.
Rethinking Cybersecurity Ontology Classification and Evaluation: Towards a Credibility-Centered Framework
Cryptography and Security
Builds trust in computer security tools.
Analysis of Publicly Accessible Operational Technology and Associated Risks
Cryptography and Security
Reveals 70,000 factory controls exposed online