Joe Samuel← All work

Polaris Structural Security Posture Analysis Tool

Polaris allows anyone with a web browser to design and analyze the structural security posture of their system. Polaris simplifies the structural security posture analysis into three steps: Design, Analyze, and Summarize.

Try It

The Problem

Security analysis at the architectural design level is often skipped due to the complexity of the process and the lack of accessible tooling. Developers and architects need a way to evaluate the security posture of their system designs without specialized expertise or heavyweight enterprise tools.

The Solution

Polaris was launched in September 2021 as part of the Compass toolkit. It is open-source and freely accessible, enabling teams to incorporate security posture analysis into their design workflows with no installation required.

Why It's Hard

Polaris is built as an open-source, stateless web application using Python, Dash, and Docker. It distills structural security posture analysis into three browser-based steps — Design, Analyze, and Summarize — making the process accessible to anyone.

The Process

  1. Discovery

    Research & Requirements

    Identified the gap in accessible security analysis tooling for system architects and mapped out the three-step analysis workflow.

    Requirements documentWorkflow specification
  2. Architecture

    System Design

    Designed a stateless, containerized web architecture using Python and Dash to ensure zero installation and broad accessibility.

    Architecture diagramComponent spec
  3. Ship

    Launch & Integration

    Deployed Polaris as part of the Compass toolkit in September 2021, open-source and freely accessible via web browser.

    Deployed toolCompass toolkit integration

Architecture

Web Browser

User Interface (Dash)

Polaris Backend

Python / Stateless

Analysis Engine

Attack Surface & Centrality

Docker Container

Deployment

Web Browser

User Interface (Dash)

Polaris Backend

Python / Stateless

Analysis Engine

Attack Surface & Centrality

Docker Container

Deployment

How It Works

1

Design

Model your system architecture by adding components and connections in the browser-based design canvas.

2

Analyze

Run structural security posture analysis to identify attack surface exposure and centrality risk across your design.

3

Summarize

Receive a summary report of your system's security posture with actionable insights for improving your design.

Techniques

  • ✓Structural Security Posture Analysis
  • ✓Attack Surface Analysis
  • ✓Centrality Analysis
  • ✓System Design

Technologies

  • ✓Python
  • ✓Dash
  • ✓Docker
  • ✓Containerization

Previous

Atlas — AI-Driven Diagnostics Data Mining & Triaging

Next

Merak Asset Threat Analysis Tool

Let's connect

EmailLinkedInGitHubGoogle ScholarResume ↓