Skip to content

Risk Assessment Methodology

IEC 62443-4-1 SM-5 Compliance

1. Purpose

This document defines the risk assessment methodology for the RUNE platform, satisfying IEC 62443-4-1 SM-5 requirements for a formal risk assessment process. It establishes how threats are identified, analyzed, and prioritized to inform security controls throughout the SDL (SDL.md).

2. Scope

This methodology applies to all RUNE components, infrastructure, and third-party integrations. It covers:

  • Software threats (vulnerabilities, misconfigurations).
  • Supply chain threats (dependency compromise, CI pipeline attacks).
  • Operational threats (cost overrun, data loss, availability).
  • Compliance risks (license contamination, certification gaps).

3. Methodology: STRIDE-Based Threat Modeling

RUNE uses the STRIDE threat classification framework, applied systematically to each architectural component.

3.1 STRIDE Categories

Category Description Example in RUNE
Spoofing Impersonating a user or system Forged API tokens, unsigned container images
Tampering Modifying data or code without authorization CI pipeline poisoning, dependency substitution
Repudiation Denying actions without accountability Unsigned commits, missing audit logs
Information Disclosure Exposing data to unauthorized parties Secrets in logs, unencrypted DriverTransport
Denial of Service Disrupting availability Vast.ai cost bomb, resource exhaustion
Elevation of Privilege Gaining unauthorized access RBAC bypass in operator, container escape

3.2 Threat Modeling Process

flowchart TD
    A[Define Scope & Assets] --> B[Decompose Architecture]
    B --> C[Identify Threats per STRIDE]
    C --> D[Assess Likelihood & Impact]
    D --> E[Calculate Risk Score]
    E --> F{Risk Score >= 15?}
    F -->|Yes| G[Mandatory Mitigation]
    G --> H[Record in Risk Register]
    F -->|No| I{Risk Score >= 8?}
    I -->|Yes| J[Recommended Mitigation]
    J --> H
    I -->|No| K[Accept & Monitor]
    K --> H
    H --> L[Review Quarterly]

3.3 Assessment Criteria

Likelihood (1-5)

Score Level Description
1 Rare Requires highly specialized knowledge and access; no known exploits
2 Unlikely Requires significant effort or insider access
3 Possible Known attack vector exists; moderate skill required
4 Likely Attack is straightforward with publicly available tools
5 Almost Certain Actively exploited or trivially exploitable

Impact (1-5)

Score Level Description
1 Negligible No data loss; minor inconvenience; self-recovering
2 Minor Limited data exposure; single-user impact; quick recovery
3 Moderate Significant data exposure; service degradation; hours to recover
4 Major Broad data breach; extended outage; financial loss (e.g., Vast.ai costs)
5 Catastrophic Complete system compromise; irrecoverable data loss; compliance failure

Risk Score

Risk Score = Likelihood x Impact

Score Range Risk Level Required Action
1-4 Low Accept and monitor
5-7 Low-Medium Accept with documented justification
8-14 Medium Recommended mitigation within next milestone
15-19 High Mandatory mitigation; tracked as priority issue
20-25 Critical Immediate action; may block release

3.4 Treatment Options

Treatment Description When to Use
Mitigate Implement controls to reduce likelihood or impact Default for High/Critical risks
Accept Acknowledge the risk with documented justification Low risks; risks below threshold with no fix
Transfer Shift risk to a third party (insurance, SaaS provider) Infrastructure risks outside project control
Avoid Eliminate the threat by removing the feature or dependency When mitigation cost exceeds feature value

4. Data Flow Diagram

flowchart LR
    User([User / CLI]) --> API[REST API]
    API --> Orch[Orchestration Engine]
    Orch --> DT[DriverTransport]
    DT --> Agent[Agent Runners]
    Orch --> LLM[LLM Backends]
    Orch --> RP[Resource Providers]
    RP --> Vast[Vast.ai]
    RP --> Ollama[Ollama]
    API --> DB[(SQLite)]
    CI[CI Pipeline] --> Registry[Container Registry]
    Registry --> K8s[Kubernetes]

    style API fill:#f96,stroke:#333
    style DT fill:#f96,stroke:#333
    style RP fill:#f96,stroke:#333

Trust boundaries (highlighted in orange) are the primary targets for threat modeling: the REST API, DriverTransport protocol, and resource provider interfaces.

5. Review and Update

Activity Frequency Owner
Full threat model review Quarterly Security Lead
Risk register update Quarterly or on significant change Security Lead
Post-incident risk reassessment After every P0/P1 incident Incident Commander
Methodology review Annually Project Owner

6. Outputs

The primary output of this methodology is the Risk Register (RISK_REGISTER.md), which tracks all identified risks, their scores, treatment decisions, and review status.

7. References

  • IEC 62443-4-1:2018 SM-5 -- Security risk assessment
  • Microsoft STRIDE threat model
  • NIST SP 800-30 -- Guide for Conducting Risk Assessments
  • SDL.md -- Security Development Lifecycle
  • RISK_REGISTER.md -- Active risk register
  • PENTEST.md -- Penetration testing (validates risk assessments)
  • SYSTEM_PROMPT.md -- Architecture and constraints