AMI Threat Modeling
A threat model is a description of a set of possible attacks to consider when designing a system. Furthermore, the threat model can be used to assess the probability, severity, and reasoning of certain attacks and allow for designers to implement proper controls for mitigation purposes. The development of a threat model includes listing the security assumptions, threat agents, motivations, threats, vulnerabilities, controls, and assets in the system of interest.
Because of the nature of AMI networks, it is not possible to conduct a real-world penetration test. As such, this service is designed to provide detailed simulated attacks against a virtualized model of the AMI infrastructure. By revealing both technical and structural vulnerabilities of AMI infrastructures, Red Clay enables decision makers to analyze the maturity of the architecture and its susceptibility to cyberattacks.