Creating a Cyber Security Attack Graph Diagram

To create a Cyber Security Attack Graph Diagram


  1. In the Containment tree, right-click any required package and select Create Diagram.



  2. Do one of the following:

Adding an Attack Path Step in the Attack Graph

To add a new Attack Path Step in the Attack Graph



To add an existing Attack Path Step, CWE Element, or any Situation in the Attack Graph


Creating a Causality Relation between Attack Path Steps

To create a Causality Relation between Attack Path Steps


An arrow icon is displayed in the graph which denotes that causality relation is created.


Generating an Attack Path from the Attack Graph

To generate an Attack Path from the Attack Graph


  1. In the attack graph, select the two required attack steps by holding down the Shift key. The selected attack paths are considered as two ends of an attack path.

  2. Right-click and select the Generate Attack Paths command.



  3. In the Select Attack Paths dialog, select the required attack path from the list of available attack paths and click OK.

    Loops present in the attack graph are eliminated while calculating the attack path(s).



  4. In the Select Destination Package dialog, select the package to save the generated attack path(s).



    • After generation of an Attack Path, if Attack Graph changes in such a way that the path is not valid anymore, a validation rule is triggered and an error occurs. You can fix the error from the Attack Path, but in such case, the path will not be linked to the graph anymore. Also, no further errors will be reported on that Attack Path if the graph is further modified.
    • The generated attack path(s) are manual attack paths.