Building Bridges of Security, Sovereignty and Trust in Business and Industry 27th Edition | Page 29

Threat Modeling for Digital Twins
Figure 1-2: The architecture of the FleetTwin case study.
2 ASSETS AND DAMAGE CONSIDERATIONS FOR THE ATTACK ON DIGITAL TWINS
Listing the assets is essential for many methods of threat modeling. At the same time, it may be challenging when it comes to applying it to a real case. Asset identification is the minor issue if you need just to label them for registration. Assets in threat modeling are connected to damage scenarios, then – to the attacks and attacking scenarios, and then – to vulnerabilities. Each step multiplies the number of entities under consideration and makes the threat model too vast and complex. That means we need to reduce these numbers at each step, starting from the number of assets.
Main issues of asset identification for threat modeling are the following:
• Granularity( e. g. what is the asset: the data storage or the separate file)
24 May 2025