A Practical Build Process
Go Deeper in Foundations
Seven Steps That Produce a Defensible Model
1) Define the objective. Pick one attacker goal that you can verify, such as unauthorized PLC logic change or privileged cloud credential theft.
2) Bound the system. Draw trust boundaries, assets, and assumptions. For OT, include safety and availability requirements.
3) Choose the representation. Tree for alternative strategies, graph for path computation, technique model for operational mapping.
4) Define primitives. Preconditions, actions, and postconditions. For CPS, add physical constraints and process invariants.
5) Populate evidence. Inventory, vulnerability data, observed techniques, logs, and control coverage.
6) Analyze and prioritize. Critical paths, chokepoints, and high leverage controls. Validate with tests, not opinions.
7) Operationalize. Turn the model into detections, hardening tasks, and repeatable exercises. Update as the system changes.

