What CRSE answers

  • “If a ransomware operator got in today, what’s my expected loss?”
  • “Which two controls, when both weak, account for the most blast radius?” (toxic combinations)
  • “Where are my gaps against MITRE ATT&CK?”
  • “If this vendor is compromised, what fraction of my revenue is exposed?”

The primitives

ObjectWhat it is
TemplateA canonical threat scenario (ransomware, BEC, supply-chain compromise, …).
SimulationA single run of a template against the tenant’s controls & vendors. Produces a distribution of outcomes.
ChainA multi-step simulation joining several templates (e.g. phishing → lateral movement → data exfil).
MITRE mappingEach control maps to the ATT&CK techniques it mitigates. Used to compute coverage.
Loss parameterBusiness-impact values (cost per record, downtime cost, regulatory fine models) that convert a breach into a dollar value.
Toxic combinationA pair (or small set) of control weaknesses that together produce disproportionate blast radius.

Running a simulation

  1. Pick a template (GET /api/crse/templates).
  2. Pick targets (business units, vendors, data elements) from GET /api/crse/target-options.
  3. Override any loss parameters (PUT /api/crse/loss-parameters/overrides) — defaults come from the tenant’s industry template.
  4. Start the run (POST /api/crse/simulations). The dispatcher executes the simulation asynchronously.
  5. Poll GET /api/crse/simulations/<runId> or subscribe to workflow KRI events for completion.

Chains

A chain is an ordered sequence of templates with shared state. The first step’s output (e.g. “attacker has domain admin”) feeds the second step’s preconditions. Chains are either authored by hand (POST /api/crse/chains) or auto-generated from your threat model (POST /api/crse/chains/auto-generate).

MITRE mappings & coverage

Every control has zero or more MITRE ATT&CK technique mappings. The coverage view reports, for each tactic / technique, which controls would mitigate an attacker using it and how effective those controls currently are (per KRI). Gaps drive the CRSE’s scenario-probability model.

Toxic combinations

After each simulation, CRSE identifies toxic combinations — pairs of weak controls whose joint failure accounts for a disproportionate share of blast radius. The expert panel uses these when asked “what should I fix next?” to justify prioritisation against dollar impact, not headcount effort.

Regulatory fine models

Regulatory fines are first-class. GET /api/crse/regulatory-fine-models returns the shipped models (GDPR, CCPA, HIPAA, sector-specific rules). Simulations fold the applicable model into the loss distribution based on the data elements exposed in the scenario.