ATT&CK Summary with artifacts and attacks.
D3FEND Summary with artifacts and defenses.
This is a description of your IT architecture in RDF format. Nodes are described using MITRE categories.
graph placeholder
This is a python console that you can use to inspect and query the semantic graphs `g` and `g1`. Moreover, you can issue SPARQL queries using the `g.query()` method. Currently it does only show the returned value of the last python line, so statements such as print(), while evaluated, are not shown.
Intro
This tool shows how to use the D3FEND ontology to support the design and review of IT architectures.
- Represent the components of your infrastructure and their relationships in the left pane editor using Mermaid JS syntax.
- Classify your components using the D3FEND vocabulary that is available via auto-complete.
For example, you can type
d3f:mail CTRL+space
and the auto-complete will suggest the possible choices. The following text represents a Client that sends emails to a MTA:Client -->|sends d3f:Email to| MTA
The application is capable to label major sofware applications (e.g. nginx, postfix, ...) and to map them to the corresponding D3FEND classes (e.g.d3f:MailTransferAgent
). You can also use some icons from font-awesome (see the gallery) to make your diagram more fancy. For example you can use thefab:fa-react
icon to indicate that a component is a WebUI. - Now, click on the ATT&CK tab to show the attacks associated with the specific DigitalArtifacts, or on the D3FEND tab to see the corresponding defensive measures. The tables contain hyperlinks to the corresponding D3FEND classes and ATT&CK techniques.
- The D3FEND graph is a RDF graph represented in Turtle format. You can copy and paste it in your favorite RDF editor (e.g. W3C RDF validator).
Open Source
This tool is Open Source, contributions are welcome.
- Source code: github.com/par-tec/d3fend-tools