SLIDE 1
IT2EC 2020 IT2EC Extended Abstract Template Presentation/Panel
Digital Twin for Cyber Testing
Michael J. O’Connor Chief Technologist, Trideum, Huntsville, United States
Abstract — This paper addresses both the Digital Twin Approach and Synthetic Environments topics for performing cyber testing on weapons systems. The use of digital twins is a critical part of cyber testing because this type of testing cannot be performed on operational systems. Weapon systems have cyber vulnerabilities in addition to the ones found
- n IP networks. These vulnerabilities can only be found by creating a synthetic wrap-around to fully stimulate the
system with an operationally relevant environment. The use of the cyber table top process to implement a digital twin and synthetic environments as part of weapons testing is described. The methodology used to apply the concepts of digital twin and synthetic environments along with lessons learned in the performance to cyber testing of weapons systems will be presented.
1 Introduction
Performing cyber testing on complex systems presents a number of challenges. One of the biggest is access to the systems to perform potentially destructive cyber testing. Another issue is providing the operationally relevant wrap around environment to the system under test (SUT) without compromising any of the systems with a cyber
- threat. One approach for this is to create a digital twin of
the system. This is the only approach for single copy national systems, but is also useful for weapon systems.
2 Approach
The goal is to develop a digital twin that can be tested for cyber vulnerabilities in an operationally relevant
- environment. This approach allows potentially destructive
cyber testing without damaging an operational system or expense weapon system. There are three parts to this approach: Perform the Cyber Table Top Develop the Digital Twin Develop the Operational Wraparound This approach creates an operationally relevant test environment for the system under test. This will allow the performance of cyber testing in an operationally realistic environment without exposing an operational system to risk. 2.1 Cyber Table Top The development of a digital twin begins with a Cyber Table Top (CTT). CTT is a process that brings operators, developers, and threat teams together to review the SUT for likely cyber threat vectors. The threat vectors identified in the CTT informs the development of the digital twin. While it preferable to create a complete hardware and software digital twin, this is not always possible due to availability or cost reasons. The CTT results can be used to determine which parts of the system have to be implemented with the real hardware and software and which parts can be emulated. The threat teams propose potential threat vectors to the
- system. This is based on the threat teams experience and
their review of the system. The developers respond to the by assessing the likely hood of the system being vulnerable to the potential threats. If the developers believe the system may be vulnerable to the threat, they determine what the effect on the system from the threat would be. Finally, the operators evaluate impact on operations of the threats effect on the system. The operators may determine that the impact to operations is minimum because there are redundant systems in place or there are existing workarounds to the impact. They may also determine the impact is significant because the threat effect would prevent their mission. The impact may also be between these two extremes. All of the participants of the CTT are involved in the
- discussion. The goal is to reach consensus of the CTT
participants on the threats and the impact on the mission of the system. A risk matrix is produced for each of the threats which are determined to have a mission impact. The research for the CTT and the discussions will also establish the requirements for an operationally realistic test
- environment. The developers and operators will document