Threat Modeling: Lessons from Star Wars. Adam
|
|
|
- Clementine Paula Booker
- 9 years ago
- Views:
Transcription
1 Threat Modeling: Lessons from Star Wars Adam
2 Agenda What is threat modeling? A simple approach to threat modeling Top 10 lessons Learning more
3 What is threat modeling?
4 A SIMPLE APPROACH TO THREAT MODELING
5 4 Questions 1. What are you building? 2. What can go wrong? 3. What are you going to do about it? 4. Did you do an acceptable job at 1-3?
6 What are you building? Data Flow Diagrams are a great representation
7 What Can Go Wrong? Remember STRIDE
8 Spoofing By Lego Envy,
9 Tampering
10 Repudiation Repudiation By Seb H
11 Information Disclosure
12 Information Disclosure (and impact) Photo by Simon Liu
13 Model by Nathan Sawaya Denial of Service
14 Elevation of Privilege
15 4 Questions 1. What are you building? 2. What can go wrong? 3. What are you going to do about it? 4. Did you do an acceptable job at 1-3?
16 TOP TEN LESSONS
17
18 Trap #1: Think Like An Attacker Think like a professional chef? Most people need structure
19 Trap #2: You re Never Done Threat Modeling Model Model Validate Identify Threats Identify Threats Mitigate Mitigate Validate
20 Trap #3: The Way To Threat Model Is Too much focus on specifics of how Use this framework (STRIDE) With this diagram type Focus on what delivers value by helping people find good threats Focus on what delivers value by helping lots of people Borrowing a line from the Perl folks There s more than one way to threat model
21 Trap #3: Monolithic Processes Model Model Identify Threats Identify Threats Mitigate Privacy Address Threats Validate Validate
22 Trap #3: The Way To Threat Model Is Security mavens Experts in other areas
23 Trap #4: Threat Modeling as One Skill Technique: DFDs, STRIDE, Attack trees Repertoire: SSLSpoof, Firesheep Mitnick, Cuckoo's Egg Conficker, Stuxnet and Crilock Frameworks and organization Elicitation and memory for experts There s Technique and Repertoire
24 Trap #5: Threat Modeling is Born, Not Taught Playing a violin You need to develop and maintain muscles Beginners need easy and forgiving tunes Not everyone wants or needs to be a virtuoso Threat Modeling Is Like Playing A Violin
25 We ve got to give them more time!
26 Trap #6: The Wrong Focus Start from your assets Start by thinking about your attackers Thinking that threat modeling should focus on finding threats Remember trap #3: The Way to threat model is Starting from assets or attackers work for some people
27 Trap #7: Threat Modeling is for Specialists Version control: Every developer, most sysadmins know some Some orgs have full time people managing trees This is a stretch goal for threat modeling
28 Trap #8: Threat Modeling Without Context Some threats are easy for a developer to fix (for example, add logging) Some threats are easy for operations to fix (look at the logs) Good threat modeling can build connections Security Operations Guide Non-requirements
29 Trap #9: Laser-Like Focus on Threats Requirements 1 Requirements drive threats 2 Threats expose requirements 6 5 Un-mitigatable threats drive requirements Threats 3 Threats need mitigation Mitigations Mitigations can be bypassed 4 Interplay of attacks, mitigations and requirements
30 Trap #10: Threat Modeling at the Wrong Time Sir, we ve analyzed their attack pattern, and there is a danger
31 Summary Anyone can threat model, and everyone should The skills, techniques and repertoire can all be learned There are many traps Threat modeling is one of the most effective ways to drive security through your product, service or system
32 Call to Action Remember the 4 Questions Be proactive: Find security bugs early Fix them before they re exploited Drive threat modeling through your organization Drive threat modeling throughout the profession
33 All models are wrong, some models are useful George Box
34 Questions? Please use the microphones Or Or read the new book Threatmodelingbook.com
35 Resources: Additional Books The Checklist Manifesto by Atul Gawande Thinking Fast & Slow by Daniel Kahneman The Cukoo s Egg by Cliff Stoll Ghost in the Wires by Kevin Mitnick Understanding Privacy by Dan Solove Privacy in Context by Helen Nissenbaum
36 Part I: Getting Started 1. Dive in and threat model 2. Strategies for threat modeling Part II: Finding Threats 3. STRIDE 4. Attack Trees 5. Attack Libraries 6. Privacy Tools Part III: Managing and Addressing Threats 7: Processing and managing threats 8. Defensive Building Blocks 9. Tradeoffs when addressing threats 10. Validating threats are addressed 11. Threat modeling tools Threat Modeling: Designing For Security Part IV: Threat modeling in technologies and tricky areas 12. Requirements cookbook 13. Web and cloud threats 14. Accounts and Identity 15. Human Factors and Usability 16. Threats to cryptosystems Part IV: Taking it to the next level 17. Bringing threat modeling to your organization 18. experimental approaches 19 Architecting for success Appendices Helpful tools, Threat trees, Attacker Lists, Elevation of Privilege (the cards), Case studies
37 Thank you! Star Wars: Episodes IV-VI Great Creative Commons Lego brick art: Lego Envy, Seb H Simon Liu Kaitan Tylerguy Nathan Sawaya,
38 BACKUP
39
40 Different Threats Affect Each Element Type ELEMENT S T R I D E External Entity Process Data Store? Data Flow
41 This isn t the reputation you re looking for
tj.jmffliim.upij II, 14 1" H'H'.i.U.' Threat Modeling Designing for Security Adam Shostack WILEY
tj.jmffliim.upij II, 14 1" H'H'.i.U.' w Threat Modeling Designing for Security Adam Shostack WILEY Contents Introduction xxi Part I Getting Started 1 Chapter 1 Dive In and Threat Model! 3 Learning to Threat
Rapid Threat Modeling Techniques
SESSION ID: ASD-R01 Rapid Threat Modeling Techniques Chad Childers IT Security Ford Motor Company Agenda Threat Modeling background Lessons Learned to make threat modeling faster Techniques specifically
Introduction to Information Security
Introduction to Information Security Chapter 1 Information Security Basics Winter 2015/2016 Stefan Mangard, www.iaik.tugraz.at What is Information Security? 2 Security vs. Safety The German word Sicherheit
Threat Modeling: The Art of Identifying, Assessing, and Mitigating security threats
Threat Modeling: The Art of Identifying, Assessing, and Mitigating security threats Mohamed Ali Saleh Abomhara University of Agder [email protected] Winter School in Information Security, Finse May
Mobile Application Threat Analysis
The OWASP Foundation http://www.owasp.org Mobile Application Threat Analysis Ari Kesäniemi Nixu Copyright The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under
Security Testing. How security testing is different Types of security attacks Threat modelling
Security Testing How security testing is different Types of security attacks Threat modelling Note: focus is on security of applications (not networks, operating systems) Security testing is about making
Threat modeling. Tuomas Aura T-110.4206 Information security technology. Aalto University, autumn 2011
Threat modeling Tuomas Aura T-110.4206 Information security technology Aalto University, autumn 2011 Threats Threat = something bad that can happen Given an system or product what are the threats against
Challenges of Software Security in Agile Software Development
Challenges of Software Security in Agile Software Development Dr. Panayotis Kikiras INFS133 March 2015 Agenda Lean Principles and Agile Development Usable Security Secure software development in Agile
Microsoft STRIDE (six) threat categories
Risk-based Security Testing: Prioritizing Security Testing with Threat Modeling This lecture provides reference material for the book entitled The Art of Software Security Testing by Wysopal et al. 2007
BEST PRACTICES FOR SECURITY TESTING TOP 10 RECOMMENDED PRACTICES
BEST PRACTICES FOR SECURITY TESTING TOP 10 RECOMMENDED PRACTICES Disclaimer!! Best Practices are Not rules or rigid standards General solutions to common problems Guidelines and common reference that can
Entire contents 2011 Praetorian. All rights reserved. Information Security Provider and Research Center www.praetorian.com
Entire contents 2011 Praetorian. All rights reserved. Information Security Provider and Research Center www.praetorian.com Threat Modeling "Threat modeling at the design phase is really the only way to
Security and Privacy in Cloud Computing
Security and Privacy in Cloud Computing Ragib Hasan Johns Hopkins University en.600.412 Spring 2010 Lecture 2 02/01/2010 Threats, vulnerabilities, and enemies Goal Learn the cloud computing threat model
Threat Modeling. 1. Some Common Definition (RFC 2828)
Threat Modeling Threat modeling and analysis provides a complete view about the security of a system. It is performed by a systematic and strategic way for identifying and enumerating threats to a system.
Agile and Secure Can We Be Both? Chicago OWASP. June 20 th, 2007
Agile and Secure Can We Be Both? Chicago OWASP June 20 th, 2007 The Agile Practitioner s Dilemma Agile Forces: Be more responsive to business concerns Increase the frequency of stable releases Decrease
Development Processes (Lecture outline)
Development*Process*for*Secure* So2ware Development Processes (Lecture outline) Emphasis on building secure software as opposed to building security software Major methodologies Microsoft's Security Development
Agile and Secure: OWASP AppSec Seattle Oct 2006. The OWASP Foundation http://www.owasp.org/
Agile and Secure: Can We Be Both? OWASP AppSec Seattle Oct 2006 Dan Cornell, OWASP San Antonio Leader Principal, Denim Group Ltd. [email protected] (210) 572-4400 Copyright 2006 - The OWASP Foundation
Threat Modeling/ Security Testing. Tarun Banga, Adobe 1. Agenda
Threat Modeling/ Security Testing Presented by: Tarun Banga Sr. Manager Quality Engineering, Adobe Quality Leader (India) Adobe Systems India Pvt. Ltd. Agenda Security Principles Why Security Testing Security
Threat Modeling. Categorizing the nature and severity of system vulnerabilities. John B. Dickson, CISSP
Threat Modeling Categorizing the nature and severity of system vulnerabilities John B. Dickson, CISSP What is Threat Modeling? Structured approach to identifying, quantifying, and addressing threats. Threat
IoT IT Security and Secure Development Life Cycle
IoT IT Security and Secure Development Life Cycle Security BSides Ljubljana, 2015 By Christopher Scheuring, ERNW Germany #2 /whoami Christopher Scheuring Security Analyst @ ERNW Since 2010 IT Security
Threat Intelligence Pty Ltd [email protected] 1300 809 437. Specialist Security Training Catalogue
Threat Intelligence Pty Ltd [email protected] 1300 809 437 Specialist Security Training Catalogue Did you know that the faster you detect a security breach, the lesser the impact to the organisation?
Threat Modeling. Frank Piessens ([email protected] ) KATHOLIEKE UNIVERSITEIT LEUVEN
Threat Modeling Frank Piessens ([email protected] ) Secappdev 2007 1 Overview Introduction Key Concepts Threats, Vulnerabilities, Countermeasures Example Microsoft s Threat Modeling Process
A Methodology for Capturing Software Systems Security Requirements
A Methodology for Capturing Software Systems Security Requirements Hassan EL-Hadary Supervised by: Prof. Sherif EL-Kassas Outline Introduction to security Software Security Security Definitions Security
Security Defense Strategy Basics
Security Defense Strategy Basics Joseph E. Cannon, PhD Professor of Computer and Information Sciences Harrisburg University of Science and Technology Only two things in the water after dark. Gators and
Secure By Design: Security in the Software Development Lifecycle
Secure By Design: Security in the Software Development Lifecycle Twin Cities Rational User s Group Security Briefing by Arctec Group (www.arctecgroup.net) Integrating Security into Software Development
Security Threats in Demo Steinkjer
Security Threats in Demo Steinkjer Report from the Telenor-SINTEF collaboration project on Smart Grids Author(s) Inger Anne Tøndel, SINTEF Martin Gilje Jaatun, SINTEF Maria Bartnes Line, SINTEF/NTNU SINTEF
Vulnerability Management in an Application Security World. AppSec DC November 12 th, 2009. The OWASP Foundation http://www.owasp.
Vulnerability Management in an Application Security World AppSec DC November 12 th, 2009 Dan Cornell Global Membership Committee Denim Group [email protected] (210) 572-4400 Twitter: @danielcornell The
The introduction covers the recent changes is security threats and the effect those changes have on how we protect systems.
1 Cyber-attacks frequently take advantage of software weaknesses unintentionally created during development. This presentation discusses some ways that improved acquisition practices can reduce the likelihood
Experiences Threat Modeling at Microsoft
Experiences Threat Modeling at Microsoft Adam Shostack [email protected] Microsoft Abstract. Describes a decade of experience threat modeling products and services at Microsoft. Describes the
Web application testing
CL-WTS Web application testing Classroom 2 days Testing plays a very important role in ensuring security and robustness of web applications. Various approaches from high level auditing through penetration
New Zealand Company Six full time technical staff Offices in Auckland and Wellington
INCREASING THE VALUE OF PENETRATION TESTING ABOUT YOUR PRESENTER Brett Moore Insomnia Security New Zealand Company Six full time technical staff Offices in Auckland and Wellington Penetration Testing Web
Secure Programming Lecture 9: Secure Development
Secure Programming Lecture 9: Secure Development David Aspinall, Informatics @ Edinburgh 24th February 2014 Outline Overview Lifecycle security touchpoints 1. Code review and repair 2. Architectural risk
In Building Security In, Gary McGraw proposes three pillars to use throughout the lifecycle: I: Applied Risk Management
Secure Programming Lecture 9: Secure Development David Aspinall, Informatics @ Edinburgh 24th February 2014 Outline Overview Lifecycle security touchpoints 1. Code review and repair 2. Architectural risk
Security Goals Services
1 2 Lecture #8 2008 Freedom from danger, risk, etc.; safety. Something that secures or makes safe; protection; defense. Precautions taken to guard against crime, attack, sabotage, espionage, etc. An assurance;
Attack Intelligence: Why It Matters
Attack Intelligence: Why It Matters WHITE PAPER Core Security +1 617.399-6980 [email protected] www.coresecurity.com A Proactive Strategy Attacks against your organization are more prevalent than ever,
An Approach to Threat Modeling in Web Application Security Analysis
Volume-5, Issue EICA2012-5, February 10, 2012 An Approach to Threat Modeling in Web Application Security Analysis Sreenivasa Rao B Dept. of Computer Science & Engineering CMJ University, Shillong, India
Threat Modeling Using Fuzzy Logic Paradigm
Issues in Informing Science and Information Technology Volume 4, 2007 Threat Modeling Using Fuzzy Logic Paradigm A. S. Sodiya, S. A. Onashoga, and B. A. Oladunjoye Department of Computer Science, University
An Information Security and Privacy Perspective for Procurement Services Projects
MANAGEMENT OF DATA: An Information Security and Privacy Perspective for Procurement Services Projects Presentation for: Procurement Services Senior Leadership Meeting Presented by: Ann Nagel, Associate
Cloud Computing Governance & Security. Security Risks in the Cloud
Cloud Computing Governance & Security The top ten questions you have to ask Mike Small CEng, FBCS, CITP Fellow Analyst, KuppingerCole This Webinar is supported by Agenda What is the Problem? Ten Cloud
NCS 330. Information Assurance Policies, Ethics and Disaster Recovery. NYC University Polices and Standards 4/15/15.
NCS 330 Information Assurance Policies, Ethics and Disaster Recovery NYC University Polices and Standards 4/15/15 Jess Yanarella Table of Contents: Introduction: Part One: Risk Analysis Threats Vulnerabilities
THREAT MODELLING FOR SQL SERVERS Designing a Secure Database in a Web Application
THREAT MODELLING FOR SQL SERVERS Designing a Secure Database in a Web Application E.Bertino 1, D.Bruschi 2, S.Franzoni 2, I.Nai-Fovino 2, S.Valtolina 2 1 CERIAS, Purdue University, West Lafayette, IN,
CHAPTER 4 : CASE STUDY WEB APPLICATION DDOS ATTACK GLOBAL THREAT INTELLIGENCE REPORT 2015 :: COPYRIGHT 2015 NTT INNOVATION INSTITUTE 1 LLC
: CASE STUDY WEB APPLICATION DDOS ATTACK 1 WEB APPLICATION DDOS ATTACK CASE STUDY MORAL Ensuring you have DoS/DDoS protection in place, before you are attacked, can pay off. OVERVIEW XYZ Corp (name changed
HP LaserJet 4345 MFP Security Checklist 3/29/2006
HP LaserJet 4345 MFP Security Checklist 3/29/2006 Table of Contents 1 Introduction... 3 1.1 Coverage and Testing... 4 1.2 Assumptions... 4 1.3 Solutions covered... 6 1.4 Organization... 6 2 Threat Model...
Storage Cloud Infrastructures
Storage Cloud Infrastructures Detection and Mitigation of MITM Attacks Presenter: Jaqueline Carmilema CyberSecurity for the Next Generation South American Round, Quito 31 January 1 February, 2013 PAGE
Introduction to Microsoft Security Development Lifecycle (SDL) Threat Modeling
Introduction to Microsoft Security Development Lifecycle (SDL) Threat Modeling Secure software made easier Presenter Name Date Course Overview Introduction and Goals How to Threat Model The STRIDE per
APPLICATION THREAT MODELING
APPLICATION THREAT MODELING APPENDIX PROCESS FOR ATTACK SIMULATION AND THREAT ANALYSIS Marco M. Morana WILEY Copyrighted material Not for distribution 1 2 Contents Appendix process for attack simulation
Threat Modelling (Web)Apps Myths and Best Practices OWASP 7.11.2012. The OWASP Foundation http://www.owasp.org. Matthias Rohr
Threat Modelling (Web)Apps Myths and Best Practices Matthias Rohr 7.11.2012 www.matthiasrohr.de [email protected] Copyright The Foundation Permission is granted to copy, distribute and/or modify this
Protecting against cyber threats and security breaches
Protecting against cyber threats and security breaches IBM APT Survival Kit Alberto Benavente Martínez [email protected] IBM Security Services Jun 11, 2015 (Madrid, Spain) 12015 IBM Corporation So
The Security Development Lifecycle. OWASP 24 June 2010. The OWASP Foundation http://www.owasp.org
The Security Development Lifecycle 24 June 2010 Steve Lipner Senior Director of Security Engineering Strategy Trustworthy Computing Microsoft Corporation [email protected] +1 425 705-5082 Copyright
SAFECode Security Development Lifecycle (SDL)
SAFECode Security Development Lifecycle (SDL) Michael Howard Microsoft Matthew Coles EMC 15th Semi-annual Software Assurance Forum, September 12-16, 2011 Agenda Introduction to SAFECode Security Training
Auditing a Web Application. Brad Ruppert. SANS Technology Institute GWAS Presentation 1
Auditing a Web Application Brad Ruppert SANS Technology Institute GWAS Presentation 1 Objectives Define why application vulnerabilities exist Address Auditing Approach Discuss Information Interfaces Walk
Pass-the-Hash. Solution Brief
Solution Brief What is Pass-the-Hash? The tools and techniques that hackers use to infiltrate an organization are constantly evolving. Credential theft is a consistent concern as compromised credentials
Assessing Network Security
Microsoft Assessing Network Security Kevin Lam David LeBlanc Ben Smith Acknowledgments Foreword Introduction xxi xxiii xxvii Parti 1 Introduction to Performing Security Assessments 3 Role of Security Assessments
ISSECO Syllabus Public Version v1.0
ISSECO Syllabus Public Version v1.0 ISSECO Certified Professional for Secure Software Engineering Date: October 16th, 2009 This document was produced by the ISSECO Working Party Syllabus Introduction to
Telephony Denial of Service (TDoS) Attacks. Dan York, CISSP Chair, VoIP Security Alliance
Telephony Denial of Service (TDoS) Attacks Dan York, CISSP Chair, VoIP Security Alliance May 29, 2013 My Background www.voipsa.org www.7ducattacks.com danyork.me DisruptiveTelephony.com blueboxpodcast.com
Onboarding Blueprint By Jonathan DeVore The Accidental Trainer This workbook is to be used with the Salesforce Onboarding Blueprint.
Onboarding Blueprint By Jonathan DeVore The Accidental Trainer This workbook is to be used with the Salesforce Onboarding Blueprint. It is not copyrighted you can share everything in this workbook with
An overwhelming majority of IaaS clouds leverage virtualization for their foundation.
1 2 3 An overwhelming majority of IaaS clouds leverage virtualization for their foundation. 4 With the use of virtualization comes the use of a hypervisor. Normally, the hypervisor simply provisions resources
Microsoft s cybersecurity commitment
Microsoft s cybersecurity commitment Published January 2015 At Microsoft, we take the security and privacy of our customers data seriously. This focus has been core to our culture for more than a decade
http://www.cisjournal.org Security Framework for Cloud Computing Environment: A Review Ayesha Malik, Muhammad Mohsin Nazir
Security Framework for Cloud Computing Environment: A Review Ayesha Malik, Muhammad Mohsin Nazir Department of Computer Science Lahore College for Women University, Lahore, Pakistan. [email protected],
As threat actors target various types of networks, companies with improperly configured network infrastructures risk the following repercussions:
TrendLabs Targeted attacks often employ tools and routines that can bypass traditional security and allow threat actors to move deeper into the enterprise network. Threat actors do this to access data
External Supplier Control Requirements
External Supplier Control s Cyber Security For Suppliers Categorised as Low Cyber Risk 1. Asset Protection and System Configuration Barclays Data and the assets or systems storing or processing it must
FIREWALL CHECKLIST. Pre Audit Checklist. 2. Obtain the Internet Policy, Standards, and Procedures relevant to the firewall review.
1. Obtain previous workpapers/audit reports. FIREWALL CHECKLIST Pre Audit Checklist 2. Obtain the Internet Policy, Standards, and Procedures relevant to the firewall review. 3. Obtain current network diagrams
Application Intrusion Detection
Application Intrusion Detection Drew Miller Black Hat Consulting Application Intrusion Detection Introduction Mitigating Exposures Monitoring Exposures Response Times Proactive Risk Analysis Summary Introduction
G-Cloud Definition of Services Security Penetration Testing
G-Cloud Definition of Services Security Penetration Testing Commercial in Confidence G-Cloud Services An Overview Inner Security is a leading CREST registered information security services provider. We
Security within a development lifecycle. Enhancing product security through development process improvement
Security within a development lifecycle Enhancing product security through development process improvement Who I am Working within a QA environment, with a focus on security for 10 years Primarily web
Threats and Vulnerabilities. Ed Crowley
Threats and Vulnerabilities Ed Crowley Threat and Vulnerability Objectives At the end of this course, you should be able to analyze and differentiate among types of: Malware Attacks Social engineering
Government + Enterprise + Innovation + Strategy
Government + Enterprise + Innovation + Strategy Australia as Lead Regional Player in Cyber War Greg Rudd CEO Crest Australia Digital Disruption What does this mean for cyber security? Digital Changes Everything
Software Security Touchpoint: Architectural Risk Analysis
Software Security Touchpoint: Architectural Risk Analysis Gary McGraw, Ph.D. Chief Technology Officer, Cigital Founded in 1992 to provide software security and software quality professional services Recognized
RACK911 Labs. Year in Review. May 6, 2014
RACK911 Labs Year in Review May 6, 014 The security of the hosting industry has always been a concern of RACK911 and in May of 013 we decided to take a more proactive role by creating a new brand called
Computer Security: Principles and Practice
Computer Security: Principles and Practice Chapter 17 IT Security Controls, Plans and Procedures First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Implementing IT Security
Getting software security Right
Getting software security Right Haiyun Xu, Theodoor Scholte April 24 2015 Table of contents 2 I 23 1. Who is SIG? 2. SIG software maintainability model 3. Getting software security Right: security by design
Database Auditing: Best Practices. Rob Barnes, CISA Director of Security, Risk and Compliance Operations [email protected]
Database Auditing: Best Practices Rob Barnes, CISA Director of Security, Risk and Compliance Operations [email protected] Verizon 2009 Data Breach Investigations Report: 285 million records were compromised
Information Security It s Everyone s Responsibility
Information Security It s Everyone s Responsibility The University of Texas at Dallas Information Security Office (ISO) Purpose of Training Information generated, used, and/or owned by UTD has value. Because
Application Security Testing
Tstsec - Version: 1 09 July 2016 Application Security Testing Application Security Testing Tstsec - Version: 1 4 days Course Description: We are living in a world of data and communication, in which the
Which Backup Option is Best?
Which Backup Option is Best? Which Backup Option is Best? Why Protect Your Data? Data loss disasters happen more frequently than you would think, for many different reasons: Human error and accidental
Data Loss Prevention Program
Data Loss Prevention Program Safeguarding Intellectual Property Author: Powell Hamilton Senior Managing Consultant Foundstone Professional Services One of the major challenges for today s IT security professional
