SlideShare a Scribd company logo
ISOL 536
Security Architecture and Design
Threat Modeling
Session 6a
“Processing Threats”
Agenda
• When to find threats
• Playing chess
• How to approach software
• Tracking threats and assumptions
• Customer/vendor
• The API threat model
• Reading: Chapter 7
When to Find Threats
• Start at the beginning of your project
– Create a model of what you’re building
– Do a first pass for threats
• Dig deep as you work through features
– Think about how threats apply to your mitigations
• Check your design & model matches as you
get close to shipping
Attackers Respond to Your Defenses
Playing Chess
• The ideal attacker will follow the road you
defend
– Ideal attackers are like spherical cows — they’re a
useful model for some things
• Real attackers will go around your defenses
• Your defenses need to be broad and deep
“Orders of Mitigation”
Order Threat Mitigation
1st Window smashing Reinforced glass
2nd Window smashing Alarm
3rd Cut alarm wire Heartbeat signal
4th Fake heartbeat Cryptographic signal integrity
By Example:
• Thus window smashing is a first order threat, cutting
alarm wire, a third-order threat
• Easy to get stuck arguing about orders
• Are both stronger glass & alarms 1st order
mitigations? (Who cares?!)
• Focus on the concept of interplay between
mitigations & further attacks
How to Approach Software
• Depth first
– The most fun and “instinctual”
– Keep following threats to see where they go
– Can be useful skill development, promoting “flow”
• Breadth first
– The most conservative use of time
• Best when time is limited
– Most likely to result in good coverage
Tracking Threats and Assumptions
• There are an infinite number of ways to
structure this
• Use the one that works reliably for you
• (Hope doesn’t work reliably)
Example Threat Tracking Tables
Diagram Element Threat Type Threat Bug ID
Data flow #4, web
server to business
logic
Tampering Add orders without
payment checks
4553 “Need
integrity controls on
channel”
Info disclosure Payment
instruments sent in
clear
4554 “need crypto”
#PCI
Threat Type Diagram Element(s) Threat Bug ID
Tampering Web browser Attacker modifies
our JavaScript order
checking
4556 “Add order-
checking logic to
server”
Data flow #2 from
browser to server
Failure to
authenticate
4557 “Add enforce
HTTPS everywhere”
Both are fine, help you iterate over diagrams in different ways
Example Assumption Tracking
Assumption Impact if it’s
wrong
Who to talk
to
Who’s
following up
Follow-up
by date
Bug #
It’s ok to
ignore
denial of
service
within the
data center
Availability
will be
below spec
Alice Bob April 15 4555
• Impact is sometimes so obvious it’s not worth filling out
• Who to talk to is not always obvious, it’s ok to start out blank
• Tracking assumptions in bugs helps you not lose track
• Treat the assumption as a bug – you need to resolve it
The Customer/Vendor Boundary
• There is always a trust boundary when:
– Your code goes to someone else’s (device/premises)
– Their data comes to your code
• All about human trust issues
• You need to think about it while deciding what
happens over the data flow shown
Your software
Customer device
Your software
Your data center
Generic API Threat Model
• Perform security checks inside the boundary
• Copy before validation for purpose
– Is http://evil.org/pwnme.html “valid”?
• Define the purpose for data, validate near that
definition
• Manage error reporting
• Document what checks happen where
• Do crypto in constant time
• Address the security requirements for your API
Recap
• When to find threats
• Playing chess
• How to approach software
• Tracking threats and assumptions
• Customer/vendor
• The API threat model

More Related Content

PPTX
Threat Modeling: Applied on a Publish-Subscribe Architectural Style
Dharmalingam Ganesan
 
PDF
Session2-Application Threat Modeling
zakieh alizadeh
 
PPTX
Architecting for Security Resilience
Joel Aleburu
 
PPTX
Application Security Architecture and Threat Modelling
Priyanka Aash
 
PPTX
The security mindset securing social media integrations and social learning...
franco_bb
 
PPTX
Secure Design: Threat Modeling
Cigital
 
PPT
Security_Updates_cybersecuirty ppt presentation.ppt
21881a6619
 
PDF
Application Threat Modeling In Risk Management
Mel Drews
 
Threat Modeling: Applied on a Publish-Subscribe Architectural Style
Dharmalingam Ganesan
 
Session2-Application Threat Modeling
zakieh alizadeh
 
Architecting for Security Resilience
Joel Aleburu
 
Application Security Architecture and Threat Modelling
Priyanka Aash
 
The security mindset securing social media integrations and social learning...
franco_bb
 
Secure Design: Threat Modeling
Cigital
 
Security_Updates_cybersecuirty ppt presentation.ppt
21881a6619
 
Application Threat Modeling In Risk Management
Mel Drews
 

Similar to ISOL 536Security Architecture and DesignThreat Modeling.docx (20)

PPTX
Threat Modeling - Locking the Door to Vulnerabilities
Security Innovation
 
DOCX
Residency ResearchISOL 536 Security Architecture and Design.docx
brittneyj3
 
PPT
Security Overview - Updates and Trends In Detail
MohanArumugam24
 
PDF
Application Threat Modeling
Priyanka Aash
 
PPTX
Threat Modeling-modélisation_de_menaces.pptx
tuxbambi
 
PPTX
Understanding Application Threat Modelling & Architecture
Priyanka Aash
 
PPT
Intro to-ssdl--lone-star-php-2013
nanderoo
 
PPTX
Security Training: #3 Threat Modelling - Practices and Tools
Yulian Slobodyan
 
PPT
Software Security in the Real World
Mark Curphey
 
PPTX
Keeping Secrets on the Internet of Things - Mobile Web Application Security
Kelly Robertson
 
PDF
20160831_app_storesecurity_Seminar
Jisoo Park
 
PPTX
Securing Underprotected APIs - Deja vu Security
Deja vu Security
 
PPTX
App sec - code insecurity basics
Christopher Hamm
 
PPTX
Threat Modeling In 2021
Adam Shostack
 
PPTX
Modernizing, Migrating & Mitigating - Moving to Modern Cloud & API Web Apps W...
Security Innovation
 
PDF
AppSec in an Agile World
David Lindner
 
PPTX
Threat Modeling And Analysis
Lalit Kale
 
PPT
ch03Threat Modeling - Locking the Door to Vulnerabilities.ppt
gealehegn
 
PDF
Threat Modeling workshop by Robert Hurlbut
DevSecCon
 
PDF
RIoT (Raiding Internet of Things) by Jacob Holcomb
Priyanka Aash
 
Threat Modeling - Locking the Door to Vulnerabilities
Security Innovation
 
Residency ResearchISOL 536 Security Architecture and Design.docx
brittneyj3
 
Security Overview - Updates and Trends In Detail
MohanArumugam24
 
Application Threat Modeling
Priyanka Aash
 
Threat Modeling-modélisation_de_menaces.pptx
tuxbambi
 
Understanding Application Threat Modelling & Architecture
Priyanka Aash
 
Intro to-ssdl--lone-star-php-2013
nanderoo
 
Security Training: #3 Threat Modelling - Practices and Tools
Yulian Slobodyan
 
Software Security in the Real World
Mark Curphey
 
Keeping Secrets on the Internet of Things - Mobile Web Application Security
Kelly Robertson
 
20160831_app_storesecurity_Seminar
Jisoo Park
 
Securing Underprotected APIs - Deja vu Security
Deja vu Security
 
App sec - code insecurity basics
Christopher Hamm
 
Threat Modeling In 2021
Adam Shostack
 
Modernizing, Migrating & Mitigating - Moving to Modern Cloud & API Web Apps W...
Security Innovation
 
AppSec in an Agile World
David Lindner
 
Threat Modeling And Analysis
Lalit Kale
 
ch03Threat Modeling - Locking the Door to Vulnerabilities.ppt
gealehegn
 
Threat Modeling workshop by Robert Hurlbut
DevSecCon
 
RIoT (Raiding Internet of Things) by Jacob Holcomb
Priyanka Aash
 

More from bagotjesusa (20)

DOCX
Issues Identify at least seven issues you see in the case1..docx
bagotjesusa
 
DOCX
Issues and disagreements between management and employees lead.docx
bagotjesusa
 
DOCX
ISSN1369 7021 © Elsevier Ltd 2010DECEMBER 2010 VOLUME 13 .docx
bagotjesusa
 
DOCX
ISSA Journal September 2008Article Title Article Author.docx
bagotjesusa
 
DOCX
ISOL 533 Project Part 1OverviewWrite paper in sections.docx
bagotjesusa
 
DOCX
Is the United States of America a democracyDetailed Outline.docx
bagotjesusa
 
DOCX
Islamic Profession of Faith (There is no God but God and Muhammad is.docx
bagotjesusa
 
DOCX
IS-365 Writing Rubric Last updated January 15, 2018 .docx
bagotjesusa
 
DOCX
ISAS 600 – Database Project Phase III RubricAs the final ste.docx
bagotjesusa
 
DOCX
Is teenage pregnancy a social problem How does this topic reflect.docx
bagotjesusa
 
DOCX
Is Texas so conservative- (at least for the time being)- as many pun.docx
bagotjesusa
 
DOCX
Irreplaceable Personal Objects and Cultural IdentityThink of .docx
bagotjesusa
 
DOCX
IRB is an important step in research. State the required components .docx
bagotjesusa
 
DOCX
irem.orgjpm jpm® 47AND REWARDRISK .docx
bagotjesusa
 
DOCX
IoT Referenceshttpswww.techrepublic.comarticlehow-to-secur.docx
bagotjesusa
 
DOCX
In two paragraphs, respond to the prompt below. Journal entries .docx
bagotjesusa
 
DOCX
Investigative Statement AnalysisInitial statement given by Ted K.docx
bagotjesusa
 
DOCX
Investigating Happiness at College SNAPSHOT T.docx
bagotjesusa
 
DOCX
Investigate Development Case Death with Dignity Physician-Assiste.docx
bagotjesusa
 
DOCX
Inventory and Production Management in Supply Chains.docx
bagotjesusa
 
Issues Identify at least seven issues you see in the case1..docx
bagotjesusa
 
Issues and disagreements between management and employees lead.docx
bagotjesusa
 
ISSN1369 7021 © Elsevier Ltd 2010DECEMBER 2010 VOLUME 13 .docx
bagotjesusa
 
ISSA Journal September 2008Article Title Article Author.docx
bagotjesusa
 
ISOL 533 Project Part 1OverviewWrite paper in sections.docx
bagotjesusa
 
Is the United States of America a democracyDetailed Outline.docx
bagotjesusa
 
Islamic Profession of Faith (There is no God but God and Muhammad is.docx
bagotjesusa
 
IS-365 Writing Rubric Last updated January 15, 2018 .docx
bagotjesusa
 
ISAS 600 – Database Project Phase III RubricAs the final ste.docx
bagotjesusa
 
Is teenage pregnancy a social problem How does this topic reflect.docx
bagotjesusa
 
Is Texas so conservative- (at least for the time being)- as many pun.docx
bagotjesusa
 
Irreplaceable Personal Objects and Cultural IdentityThink of .docx
bagotjesusa
 
IRB is an important step in research. State the required components .docx
bagotjesusa
 
irem.orgjpm jpm® 47AND REWARDRISK .docx
bagotjesusa
 
IoT Referenceshttpswww.techrepublic.comarticlehow-to-secur.docx
bagotjesusa
 
In two paragraphs, respond to the prompt below. Journal entries .docx
bagotjesusa
 
Investigative Statement AnalysisInitial statement given by Ted K.docx
bagotjesusa
 
Investigating Happiness at College SNAPSHOT T.docx
bagotjesusa
 
Investigate Development Case Death with Dignity Physician-Assiste.docx
bagotjesusa
 
Inventory and Production Management in Supply Chains.docx
bagotjesusa
 

Recently uploaded (20)

PPTX
Basics and rules of probability with real-life uses
ravatkaran694
 
PPTX
Cleaning Validation Ppt Pharmaceutical validation
Ms. Ashatai Patil
 
DOCX
Action Plan_ARAL PROGRAM_ STAND ALONE SHS.docx
Levenmartlacuna1
 
PPTX
How to Apply for a Job From Odoo 18 Website
Celine George
 
PDF
Virat Kohli- the Pride of Indian cricket
kushpar147
 
PPTX
Dakar Framework Education For All- 2000(Act)
santoshmohalik1
 
PPTX
How to Close Subscription in Odoo 18 - Odoo Slides
Celine George
 
PDF
What is CFA?? Complete Guide to the Chartered Financial Analyst Program
sp4989653
 
PDF
The Minister of Tourism, Culture and Creative Arts, Abla Dzifa Gomashie has e...
nservice241
 
PPTX
Tips Management in Odoo 18 POS - Odoo Slides
Celine George
 
PDF
The-Invisible-Living-World-Beyond-Our-Naked-Eye chapter 2.pdf/8th science cur...
Sandeep Swamy
 
PPTX
Applications of matrices In Real Life_20250724_091307_0000.pptx
gehlotkrish03
 
PPTX
An introduction to Dialogue writing.pptx
drsiddhantnagine
 
PPTX
An introduction to Prepositions for beginners.pptx
drsiddhantnagine
 
PDF
BÀI TẬP TEST BỔ TRỢ THEO TỪNG CHỦ ĐỀ CỦA TỪNG UNIT KÈM BÀI TẬP NGHE - TIẾNG A...
Nguyen Thanh Tu Collection
 
PPTX
How to Manage Leads in Odoo 18 CRM - Odoo Slides
Celine George
 
PPTX
Kanban Cards _ Mass Action in Odoo 18.2 - Odoo Slides
Celine George
 
DOCX
pgdei-UNIT -V Neurological Disorders & developmental disabilities
JELLA VISHNU DURGA PRASAD
 
PPTX
Sonnet 130_ My Mistress’ Eyes Are Nothing Like the Sun By William Shakespear...
DhatriParmar
 
PPTX
Introduction to pediatric nursing in 5th Sem..pptx
AneetaSharma15
 
Basics and rules of probability with real-life uses
ravatkaran694
 
Cleaning Validation Ppt Pharmaceutical validation
Ms. Ashatai Patil
 
Action Plan_ARAL PROGRAM_ STAND ALONE SHS.docx
Levenmartlacuna1
 
How to Apply for a Job From Odoo 18 Website
Celine George
 
Virat Kohli- the Pride of Indian cricket
kushpar147
 
Dakar Framework Education For All- 2000(Act)
santoshmohalik1
 
How to Close Subscription in Odoo 18 - Odoo Slides
Celine George
 
What is CFA?? Complete Guide to the Chartered Financial Analyst Program
sp4989653
 
The Minister of Tourism, Culture and Creative Arts, Abla Dzifa Gomashie has e...
nservice241
 
Tips Management in Odoo 18 POS - Odoo Slides
Celine George
 
The-Invisible-Living-World-Beyond-Our-Naked-Eye chapter 2.pdf/8th science cur...
Sandeep Swamy
 
Applications of matrices In Real Life_20250724_091307_0000.pptx
gehlotkrish03
 
An introduction to Dialogue writing.pptx
drsiddhantnagine
 
An introduction to Prepositions for beginners.pptx
drsiddhantnagine
 
BÀI TẬP TEST BỔ TRỢ THEO TỪNG CHỦ ĐỀ CỦA TỪNG UNIT KÈM BÀI TẬP NGHE - TIẾNG A...
Nguyen Thanh Tu Collection
 
How to Manage Leads in Odoo 18 CRM - Odoo Slides
Celine George
 
Kanban Cards _ Mass Action in Odoo 18.2 - Odoo Slides
Celine George
 
pgdei-UNIT -V Neurological Disorders & developmental disabilities
JELLA VISHNU DURGA PRASAD
 
Sonnet 130_ My Mistress’ Eyes Are Nothing Like the Sun By William Shakespear...
DhatriParmar
 
Introduction to pediatric nursing in 5th Sem..pptx
AneetaSharma15
 

ISOL 536Security Architecture and DesignThreat Modeling.docx

  • 1. ISOL 536 Security Architecture and Design Threat Modeling Session 6a “Processing Threats” Agenda • When to find threats • Playing chess • How to approach software • Tracking threats and assumptions • Customer/vendor • The API threat model • Reading: Chapter 7 When to Find Threats • Start at the beginning of your project
  • 2. – Create a model of what you’re building – Do a first pass for threats • Dig deep as you work through features – Think about how threats apply to your mitigations • Check your design & model matches as you get close to shipping Attackers Respond to Your Defenses Playing Chess • The ideal attacker will follow the road you defend – Ideal attackers are like spherical cows — they’re a useful model for some things • Real attackers will go around your defenses • Your defenses need to be broad and deep “Orders of Mitigation” Order Threat Mitigation 1st Window smashing Reinforced glass
  • 3. 2nd Window smashing Alarm 3rd Cut alarm wire Heartbeat signal 4th Fake heartbeat Cryptographic signal integrity By Example: • Thus window smashing is a first order threat, cutting alarm wire, a third-order threat • Easy to get stuck arguing about orders • Are both stronger glass & alarms 1st order mitigations? (Who cares?!) • Focus on the concept of interplay between mitigations & further attacks How to Approach Software • Depth first – The most fun and “instinctual” – Keep following threats to see where they go – Can be useful skill development, promoting “flow” • Breadth first – The most conservative use of time • Best when time is limited
  • 4. – Most likely to result in good coverage Tracking Threats and Assumptions • There are an infinite number of ways to structure this • Use the one that works reliably for you • (Hope doesn’t work reliably) Example Threat Tracking Tables Diagram Element Threat Type Threat Bug ID Data flow #4, web server to business logic Tampering Add orders without payment checks 4553 “Need integrity controls on channel” Info disclosure Payment instruments sent in clear 4554 “need crypto” #PCI
  • 5. Threat Type Diagram Element(s) Threat Bug ID Tampering Web browser Attacker modifies our JavaScript order checking 4556 “Add order- checking logic to server” Data flow #2 from browser to server Failure to authenticate 4557 “Add enforce HTTPS everywhere” Both are fine, help you iterate over diagrams in different ways Example Assumption Tracking Assumption Impact if it’s wrong Who to talk to Who’s following up Follow-up
  • 6. by date Bug # It’s ok to ignore denial of service within the data center Availability will be below spec Alice Bob April 15 4555 • Impact is sometimes so obvious it’s not worth filling out • Who to talk to is not always obvious, it’s ok to start out blank • Tracking assumptions in bugs helps you not lose track • Treat the assumption as a bug – you need to resolve it The Customer/Vendor Boundary • There is always a trust boundary when: – Your code goes to someone else’s (device/premises) – Their data comes to your code • All about human trust issues • You need to think about it while deciding what
  • 7. happens over the data flow shown Your software Customer device Your software Your data center Generic API Threat Model • Perform security checks inside the boundary • Copy before validation for purpose – Is http://evil.org/pwnme.html “valid”? • Define the purpose for data, validate near that definition • Manage error reporting • Document what checks happen where • Do crypto in constant time • Address the security requirements for your API Recap • When to find threats
  • 8. • Playing chess • How to approach software • Tracking threats and assumptions • Customer/vendor • The API threat model