Empty Banner

Threat-driven security testing
and proactive DEFense identification for EDGE-cloud systems

WP3 - Threat-driven design for security & resilience

WP3 focuses on the identification of appropriate controls to enforce in a cloud-edge system based on existing threats, by relying upon Moving Target Defence strategies able to preserve the efficacy of controls in place over time by proactively changing the attack surface.

  • T3.1 Review of MTD techniques and mechanisms for edge-cloud systems (M1-M6): analysis of available mechanisms and techniques applicable to edge-cloud systems, identification of metrics for MTD technique evaluation, identification of reconfiguration triggering factors
  • T3.2 Threat-MTD knowledge base (M6-M18): specification of the format of the Threat-MTD knowledge base, mapping MTD techniques and mechanisms onto edge-cloud assets and properties and related threats and its population
  • T3.3 MTD strategy definition (M6-M18): formalization of a reconfiguration plan and definition of reconfiguration rules