Bidirectional Path Analysis
Enumerate ingress and egress routes per segment, asset, and data class. Capture trust, visibility, and control points for each communication channel.
CDAF is a modern, standards‑aligned methodology that analyzes ingress and egress paths, applies asymmetric value (so data exfil risk isn’t under‑weighted), and produces an actionable remediation scorecard.
Most frameworks skew inbound. CDAF treats both directions as first‑class citizens and weights egress paths higher when data loss would be catastrophic. The result is a ranked, defensible backlog that accelerates remediation where it matters.
Enumerate ingress and egress routes per segment, asset, and data class. Capture trust, visibility, and control points for each communication channel.
Exfiltration isn’t equal to exploitation. CDAF lets you up‑weight egress exposure using dollarized impact so you don’t under‑prioritize data loss risk.
Technique‑mapped, evidence‑backed scores produce a credible, auditable remediation queue for engineering teams and leadership.
A transparent formula you can explain to auditors and executives. Tune weights to your risk appetite and regulatory context.
ExposureScore = (1 − ControlEfficacy) × PathCriticality × AssetLossMagnitude × EgressWeight
where
ControlEfficacy = BAS pass rate adjusted by detection latency
PathCriticality = attack‑path proximity to crown jewels (CTEM‑style)
AssetLossMagnitude = dollarized impact (FAIR inputs)
EgressWeight = multiplier for exfil‑prone routes (OSSTMM channel factors)
It blends technique coverage with business impact, preventing false equivalence between a loud port exposure and a quiet data‑exfil path.
A sorted remediation queue with owners, dependencies, and an expected score drop after each change request lands.
Every score references test artifacts and standards mappings for quick audit traceability.
CDAF is a house methodology that integrates established frameworks for common language and auditability.
Includes: path register, technique→control matrix, test evidence log, and an executive view.
No. CDAF is a methodology that orchestrates these standards. It tells you how to combine path analysis, technique mapping, testing, and impact to prioritize work.
Use a multiplier based on data class and route (e.g., endpoint→Internet gets a higher weight than DMZ→Core). Tie it to loss magnitude so data‑heavy paths rise to the top.
Test run IDs, BAS scenario names, detection timestamps, control configurations, and links to change records. Keep artifacts with each score to stay audit‑ready.
Each finding maps to a control owner and a change request. The executive view shows expected score reduction per change so leaders can sequence work.
What we collect: This site uses Plausible Analytics, a privacy‑friendly, cookie‑free analytics tool. It records anonymous usage metrics (pageviews, referrers, device types) with no personal data, fingerprinting, or cross‑site tracking.
What we don’t collect: No cookies, no advertising identifiers, no IP‑address profiling, and no sale of data. We don’t use third‑party trackers.
Where data lives: Plausible aggregates analytics and provides us with high‑level trends only. For details, see Plausible’s public data policy.
Contact: Questions or requests? Email privacy@cda-framework.com.