Threat Modeling - Part 4


What will we learn?
System Threat Modeling approaches
Unconventional Threat Modeling Techniques
Contrasting Threat Modeling approaches
Success Criteria
Strategies for effective Threat Modeling
System Threat modeling with STRIDE
System Threat Modeling Process
Define Objectives and Security Requirements
Could be compliance driven like FISMA, PCI etc.
Could be management security objectives
Contractual requirements
Company policies
Define Scope → Technical Scope, Network, Components, apps and more
Larger your scope the more time consuming and the more diluted your Threat Model is
Bound your scope
Threat models are iterative and need improvements over time so do not have an extensive scope
Decompose/Simplify Application
Data Flow Diagrams
Network Diagrams
Trust Boundaries and Zones.
Threat Assessment → Create likely Threat Scenarios
Next Steps → Mitigation/Risk, Attack Models, Vuln analysis and more.
Success Factors
Threat Model and then validate the Threat model with a pentest/VA/Red Team
Cross functional team for collaboration on the Threat Model
Time box these activities for optimal results
Get it done, don’t wait for perfect conditions (people, process, etc)
General guidelines for a system Threat Model
We are assuming we have a network diagram or a DFD with Trust Zones/Boundaries to begin our modeling process.
Map out the Escalation of Privileges Threats first
Map out the Spoofing Threats
Map out the Tampering Threats
Map out the Repudiation Threats
Map out the Information Disclosure Threats
Map out the Denial of Service Threats
This is a good way to go about approaching your first pass at the Threat Modeling process.
Threat Modeling Strategies
Brainstorming
- Well D’uh
Pre-Mortem Analysis
“Assumption of failure”
Think of horrible situations and build from there
Engages all folks including management/non-tech folks
Attack Trees
Movie style plotting
Elevation of Privilege Card game
Car game to help increase awareness and engagement in Threat Modeling activities
Sort of outdated now as it was created with Desktop applications in mind and not modern cloud infrastructure
Subscribe to my newsletter
Read articles from Sukrit Dua directly inside your inbox. Subscribe to the newsletter, and don't miss out.
Written by
