A glittering silver lock is depicted against a blurred blue background, symbolizing safety and protection.

ThreatSea: Threat analysis - effortless and precise

BMW Group Logo
DeutscheBahn_logo-2
Creditreform Logo
DERTOUR
jochen-schweizer
Dräger Logo
kuka
BMW Group Logo
DeutscheBahn_logo-2
Creditreform Logo
DERTOUR
jochen-schweizer
Dräger Logo
kuka
ProSieben_Logo_2015-2
Mercedes
Miele Logo
Volkswagen Logo
DEKRA
stihl
Sonax_logo
Weidmüller logo
ProSieben_Logo_2015-2
Mercedes
Miele Logo
Volkswagen Logo
DEKRA
stihl
Sonax_logo
Weidmüller logo

ThreatSea: Security in your own system

Threat analyses play an integral role in MaibornWolff's understanding of cybersecurity. This enables customers to correctly assess their own situation and take efficient measures. Until now, the documentation and maintenance effort involved in such an analysis presented our consultants with a major challenge. ThreatSea declares war on long threat lists in Excel and enables development teams to seamlessly integrate the procedure into agile cycles. Our proprietary 4×6 methodology provides precise suggestions. They support the team in implementing exactly the right level of security in their own system in a targeted and efficient manner.

An abstract representation shows a digital dashboard with tables and data embedded in a technical schema.

The 4X6 methodology

Based on our many years of experience, we have developed the so-called "4×6 methodology". It is essentially based on an abstraction of IT systems, the possible attacks on them and potential attackers. From a technical perspective, IT systems are divided into six classes of attack points and attackers into four authorization levels. This results in a 4×6 matrix of possible attacks. When applied to a specific system architecture, this matrix provides the team with a direct and targeted starting point for discussions on identifying and evaluating threats.

One person is wearing a light blue shirt with a button placket and breast pocket.
ThreatSea makes the practical application of all steps of the 4×6 method much more effective, from system modeling to the presentation of results. This is not just about saving time, which can sometimes amount to days for large projects, but above all about focusing on the content.
Johannes Geiger; security architect at MaibornWolff and inventor of the 4×6 method

Core features: 4 steps to a complete risk analysis

With ThreatSea and the 4×6 methodology, MaibornWolff offers its own approach to threat analysis aimed at system experts. We are convinced that, with the right skills, they can make the best decisions for their own system.

abstract-lininen-7

1. Determination of protection requirements

When determining protection requirements, all information objects worthy of protection are systematically recorded. The protection goals of confidentiality, integrity and availability are evaluated.

2. Structural analysis

3. Threat analysis according to the 4×6 method

4. Recording of measures

A laptop shows a computerized process diagram with various linked elements on its screen.

Programming languages

  • JavaScript

Frameworks / tools / (cloud) platforms

  • React
  • Redux
  • Azure
  • Kubernetes
  • Docker
  • Gitlab CI/CD

Creation of ThreatSea: A cooperation with the Mannheim University of Applied Sciences

When using the 4×6 method for the first time, we quickly realized that while the 4×6 method impresses with its simplicity, the documentation effort is very high.

That's why we had five highly motivated teams of students implement our subject-specific requirements in a software development project at Mannheim University of Applied Sciences. The project not only enriched us with completely new perspectives on the usability of the methodology, but also with five fully functional prototypes.

The winning team's ThreatSea prototype impressed with a unique user experience, a wealth of features and also picked up on the abstract idea of the methodology.

Since then, the Cybersecurity department has continued to work on ThreatSea and has brought the original prototype to production maturity. ThreatSea and the 4×6 methodology have proven themselves many times over in customer use and are indispensable for us in threat and risk analyses.

Find what suits you best
Refine your search
clear all filters