Threat Modeling: Lessons from Star Wars. Adam Shostack @adamshostack



Similar documents
tj.jmffliim.upij II, 14 1" H'H'.i.U.' Threat Modeling Designing for Security Adam Shostack WILEY

Rapid Threat Modeling Techniques

Introduction to Information Security

Understanding and evaluating risk to information assets in your software projects

Threat Modeling: The Art of Identifying, Assessing, and Mitigating security threats

Mobile Application Threat Analysis

Security Testing. How security testing is different Types of security attacks Threat modelling

Threat modeling. Tuomas Aura T Information security technology. Aalto University, autumn 2011

Challenges of Software Security in Agile Software Development

Microsoft STRIDE (six) threat categories

BEST PRACTICES FOR SECURITY TESTING TOP 10 RECOMMENDED PRACTICES

Entire contents 2011 Praetorian. All rights reserved. Information Security Provider and Research Center

Security and Privacy in Cloud Computing

Web Application Remediation. OWASP San Antonio. March 28 th, 2007

Threat Modeling. 1. Some Common Definition (RFC 2828)

Agile and Secure Can We Be Both? Chicago OWASP. June 20 th, 2007

Development Processes (Lecture outline)

Agile and Secure: OWASP AppSec Seattle Oct The OWASP Foundation

Secure Product Development

Vulnerability Management in an Application Security World. January 29 th, 2009

Threat Modeling/ Security Testing. Tarun Banga, Adobe 1. Agenda

Threat Modeling. Categorizing the nature and severity of system vulnerabilities. John B. Dickson, CISSP

IoT IT Security and Secure Development Life Cycle

Threat Intelligence Pty Ltd Specialist Security Training Catalogue

Threat Modeling. Frank Piessens ) KATHOLIEKE UNIVERSITEIT LEUVEN

A Methodology for Capturing Software Systems Security Requirements

Data Security Best Practices & Reasonable Methods

Cloud Security: Yesterday, Today, and Tomorrow

Mobile application security How security and privacy issues can derail mobile applications. Whitepaper

Security Defense Strategy Basics

Secure By Design: Security in the Software Development Lifecycle

Security Threats in Demo Steinkjer

Vulnerability Management in an Application Security World. AppSec DC November 12 th, The OWASP Foundation

We have to watch and listen to everything that people are doing so that we can catch terrorists, drug dealers, pedophiles, and organized criminals.

The introduction covers the recent changes is security threats and the effect those changes have on how we protect systems.

Experiences Threat Modeling at Microsoft

Web application testing

New Zealand Company Six full time technical staff Offices in Auckland and Wellington

Secure Programming Lecture 9: Secure Development

In Building Security In, Gary McGraw proposes three pillars to use throughout the lifecycle: I: Applied Risk Management

Security Goals Services

Lecture 7-1 Computer and Network Security. Based on slides 2011 Pearson Education, Inc. Publishing as Pearson Addison-Wesley

SEC Secure. Usable. Cheap. Data. Applications. Host Internal Network Perimeter Physical Security. People, Policies, & Process.

Attack Intelligence: Why It Matters

Information Systems Security

An Approach to Threat Modeling in Web Application Security Analysis

Threat Modeling Using Fuzzy Logic Paradigm

An Information Security and Privacy Perspective for Procurement Services Projects

Cloud Computing Governance & Security. Security Risks in the Cloud

NCS 330. Information Assurance Policies, Ethics and Disaster Recovery. NYC University Polices and Standards 4/15/15.

THREAT MODELLING FOR SQL SERVERS Designing a Secure Database in a Web Application

CHAPTER 4 : CASE STUDY WEB APPLICATION DDOS ATTACK GLOBAL THREAT INTELLIGENCE REPORT 2015 :: COPYRIGHT 2015 NTT INNOVATION INSTITUTE 1 LLC

HP LaserJet 4345 MFP Security Checklist 3/29/2006

Storage Cloud Infrastructures

Risk Management in the Development Process A Progress Report

Introduction to Microsoft Security Development Lifecycle (SDL) Threat Modeling

APPLICATION THREAT MODELING

Threat Modelling (Web)Apps Myths and Best Practices OWASP The OWASP Foundation Matthias Rohr

Protecting against cyber threats and security breaches

Improving Software Security at the. Source

The Security Development Lifecycle. OWASP 24 June The OWASP Foundation

SAFECode Security Development Lifecycle (SDL)

Auditing a Web Application. Brad Ruppert. SANS Technology Institute GWAS Presentation 1

Pass-the-Hash. Solution Brief

Assessing Network Security

Education as a defense strategy. Jeannette Jarvis Group Program Manager PSS Security Microsoft

ISSECO Syllabus Public Version v1.0

Telephony Denial of Service (TDoS) Attacks. Dan York, CISSP Chair, VoIP Security Alliance

The monsters under the bed are real World Tour

Onboarding Blueprint By Jonathan DeVore The Accidental Trainer This workbook is to be used with the Salesforce Onboarding Blueprint.

An overwhelming majority of IaaS clouds leverage virtualization for their foundation.

Microsoft s cybersecurity commitment

Vulnerability Management in an Application Security World. March 16 th, 2009

This presentation isn t intended to be comprehensive, but hopefully we ll expose you to some new options or new ways of thinking about Threat

Security Framework for Cloud Computing Environment: A Review Ayesha Malik, Muhammad Mohsin Nazir

Cyber Security & Data Privacy. January 22, 2014

As threat actors target various types of networks, companies with improperly configured network infrastructures risk the following repercussions:

External Supplier Control Requirements

FIREWALL CHECKLIST. Pre Audit Checklist. 2. Obtain the Internet Policy, Standards, and Procedures relevant to the firewall review.

Cybersecurity: Learn Critical Strategies to Protecting Your Enterprise November 6, :00PM EST

Application Intrusion Detection

WHEN THE SOFTWARE GOES BEYOND ITS REQUIREMENTS

G-Cloud Definition of Services Security Penetration Testing

Our Security Education Curriculum PREPARED FOR ASPE TECHNOLOGY BY SI, INC. toll-free:

Security within a development lifecycle. Enhancing product security through development process improvement

Threats and Vulnerabilities. Ed Crowley

Government + Enterprise + Innovation + Strategy

Software Security Touchpoint: Architectural Risk Analysis

RACK911 Labs. Year in Review. May 6, 2014

Computer Security: Principles and Practice

Behind of the Penetration testing. L33

Getting software security Right

Database Auditing: Best Practices. Rob Barnes, CISA Director of Security, Risk and Compliance Operations

Information Security It s Everyone s Responsibility

Application Security Testing

Which Backup Option is Best?

Data Loss Prevention Program

Transcription:

Threat Modeling: Lessons from Star Wars Adam Shostack @adamshostack

Agenda What is threat modeling? A simple approach to threat modeling Top 10 lessons Learning more

What is threat modeling?

A SIMPLE APPROACH TO THREAT MODELING

4 Questions 1. What are you building? 2. What can go wrong? 3. What are you going to do about it? 4. Did you do an acceptable job at 1-3?

What are you building? Data Flow Diagrams are a great representation

What Can Go Wrong? Remember STRIDE

Spoofing By Lego Envy, http://www.eurobricks.com/forum/index.php?showtopic=64532

http://pinlac.com/legodstractorbeam.html Tampering

Repudiation Repudiation By Seb H http://www.flickr.com/photos/88048956@n04/8531040850/

Information Disclosure

Information Disclosure (and impact) Photo by Simon Liu http://www.flickr.com/photos/si-mocs/6999508124/

Model by Nathan Sawaya http://brickartist.com/gallery/han-solo-in-carbonite/ Denial of Service

Elevation of Privilege http://www.flickr.com/photos/prodiffusion/

4 Questions 1. What are you building? 2. What can go wrong? 3. What are you going to do about it? 4. Did you do an acceptable job at 1-3?

TOP TEN LESSONS

Trap #1: Think Like An Attacker Think like a professional chef? Most people need structure

Trap #2: You re Never Done Threat Modeling Model Model Validate Identify Threats Identify Threats Mitigate Mitigate Validate

Trap #3: The Way To Threat Model Is Too much focus on specifics of how Use this framework (STRIDE) With this diagram type Focus on what delivers value by helping people find good threats Focus on what delivers value by helping lots of people Borrowing a line from the Perl folks There s more than one way to threat model

Trap #3: Monolithic Processes Model Model Identify Threats Identify Threats Mitigate Privacy Address Threats Validate Validate

Trap #3: The Way To Threat Model Is Security mavens Experts in other areas

Trap #4: Threat Modeling as One Skill Technique: DFDs, STRIDE, Attack trees Repertoire: SSLSpoof, Firesheep Mitnick, Cuckoo's Egg Conficker, Stuxnet and Crilock Frameworks and organization Elicitation and memory for experts There s Technique and Repertoire

Trap #5: Threat Modeling is Born, Not Taught Playing a violin You need to develop and maintain muscles Beginners need easy and forgiving tunes Not everyone wants or needs to be a virtuoso Threat Modeling Is Like Playing A Violin

We ve got to give them more time!

Trap #6: The Wrong Focus Start from your assets Start by thinking about your attackers Thinking that threat modeling should focus on finding threats Remember trap #3: The Way to threat model is Starting from assets or attackers work for some people

Trap #7: Threat Modeling is for Specialists Version control: Every developer, most sysadmins know some Some orgs have full time people managing trees This is a stretch goal for threat modeling

Trap #8: Threat Modeling Without Context Some threats are easy for a developer to fix (for example, add logging) Some threats are easy for operations to fix (look at the logs) Good threat modeling can build connections Security Operations Guide Non-requirements

Trap #9: Laser-Like Focus on Threats Requirements 1 Requirements drive threats 2 Threats expose requirements 6 5 Un-mitigatable threats drive requirements Threats 3 Threats need mitigation Mitigations Mitigations can be bypassed 4 Interplay of attacks, mitigations and requirements

Trap #10: Threat Modeling at the Wrong Time Sir, we ve analyzed their attack pattern, and there is a danger

Summary Anyone can threat model, and everyone should The skills, techniques and repertoire can all be learned There are many traps Threat modeling is one of the most effective ways to drive security through your product, service or system

Call to Action Remember the 4 Questions Be proactive: Find security bugs early Fix them before they re exploited Drive threat modeling through your organization Drive threat modeling throughout the profession

All models are wrong, some models are useful George Box

Questions? Please use the microphones Or tweet @adamshostack Or read the new book Threatmodelingbook.com

Resources: Additional Books The Checklist Manifesto by Atul Gawande Thinking Fast & Slow by Daniel Kahneman The Cukoo s Egg by Cliff Stoll Ghost in the Wires by Kevin Mitnick Understanding Privacy by Dan Solove Privacy in Context by Helen Nissenbaum

Part I: Getting Started 1. Dive in and threat model 2. Strategies for threat modeling Part II: Finding Threats 3. STRIDE 4. Attack Trees 5. Attack Libraries 6. Privacy Tools Part III: Managing and Addressing Threats 7: Processing and managing threats 8. Defensive Building Blocks 9. Tradeoffs when addressing threats 10. Validating threats are addressed 11. Threat modeling tools Threat Modeling: Designing For Security Part IV: Threat modeling in technologies and tricky areas 12. Requirements cookbook 13. Web and cloud threats 14. Accounts and Identity 15. Human Factors and Usability 16. Threats to cryptosystems Part IV: Taking it to the next level 17. Bringing threat modeling to your organization 18. experimental approaches 19 Architecting for success Appendices Helpful tools, Threat trees, Attacker Lists, Elevation of Privilege (the cards), Case studies

Thank you! Star Wars: Episodes IV-VI Great Creative Commons Lego brick art: Lego Envy, http://www.eurobricks.com/forum/index.php?showtopic=64532 http://pinlac.com/legodstractorbeam.html Seb H http://www.flickr.com/photos/88048956@n04/8531040850/ Simon Liu http://www.flickr.com/photos/si-mocs/6999508124/ Kaitan Tylerguy http://www.flickr.com/photos/kaitan/3326772088/ Nathan Sawaya, http://brickartist.com/gallery/han-solo-in-carbonite/ http://www.flickr.com/photos/prodiffusion/

BACKUP

Different Threats Affect Each Element Type ELEMENT S T R I D E External Entity Process Data Store? Data Flow

This isn t the reputation you re looking for