Go to CUI-CPP V2.0 Data Types

1     Definition 2     Functional Requirements 3     Syntax
4     Semantics 5    Conformance Testing 6     Performance Assessment

Informative

1      Definition

The collection of Cyber Risk Statements provided by the Company being assessed with an Implementation of CUI-CPP V2.0.

Note: Cyber Risk Statements reflect the current normative situation where Cyber Risk Statements and Cyber Risk Descriptors have the same format. If a jurisdiction decides to change the Format of their Cyber Risk Statements, this change shall be reflected in the Cyber Risk Statements used as input to a CUI-CPP V2.0 Implementation.

Therefore, the Cyber Risk Statements are informative.

2      Functional Requirements

See Semantics.

3      Syntax

https://schemas.mpai.community/CUI1/V2.0/data/CyberRiskStatements.json

4      Semantics

Label Description
Header Cyber Risk Statements Header
– Standard-CyberRiskStatements The characters “CUI-YRS-V”
– Version Major version – 1 or 2 characters
– Dot-separator The character “.”
– Subversion Minor version – 1 or 2 characters
MInstanceID Identifier of Virtual Space.
CyberRiskStatementTime Cyber Risk Statement Time
CyberRiskStatementsData Set of Risk Statements
– AttackerSourceIP
  – AttackDetectionTime Time the attack was started or detected.
  – VectorProviderOrSource Provider of input vector or external source.
  – Type IP address
  – AttackSorceIPAddress IP address of source of attack
– DoSDestinationIP
  – AttackDetectionTime Time the DoS was detected.
  – VectorProviderOrSource Provider of input vector or external source.
  – Type Type: IP address
  – AttackDestinationIPAddress IP address of destination of attack
– SourcePort
  – AttackDetectionTime Time the flow was started or detected.
  – Vector ProviderOrSource Provider of input vector or external source.
  – Type Number
  – AttachSourcePortNumber Port number from which the packet was sent.
– DestinationPort
  – AttackDetectionTime Time the flow was started or detected.
  – Vector ProviderOrSource Provider of input vector or external source.
  – Type Number
  – AttackDestinationPortNumber The port number to which the packet is directed.
– Protocol
  – AttackDetectionTime
  – Vector ProviderOrSource
  – Type
  – CommunicationProtocol
– Duration
  – StartAndEndTimeTime
  – Vector ProviderOrSource
  – Type
  – AttackDuration
– Packets
  – AttackDetectionTime
  – Vector ProviderOrSource
  – Type
  – TransmittedPacktetsNumber
– Bytes
  – AttackDetectionTime
  – Vector ProviderOrSource
  – Type
  – DataTransferVolume
– RequestFrequency
  – AttackDetectionTime
  – Vector ProviderOrSource
  – Type
  – OccurrenceOfFlowRate
– IPAddressEntropy
  – AttackDetectionTime
  – Vector ProviderOrSource
  – Type
  – SourceDiversity
– TCPFlag
  – AttackDetectionTime
  – Vector ProviderOrSource
  – Type
  – TCPPacketsFlag

5     Conformance Testing

A Data instance Conforms with Cyber Risk Statements (CUI-YRS) if:

  1. The Data validates against the Cyber Risk Statements’ JSON Schema.
  2. All Data in the  Cyber Risk Statements’ JSON Schema
    1. Have the specified type.
    2. Validate against their JSON Schemas.
    3. Conform with their Data Qualifiers if present.

6     Performance Assessment