threat modeling - rocissa.org€¦ · threat modeling identifying, enumerating, ... threat...

30
1 THREAT MODELING Identifying, enumerating, and prioritizing potential threats to the business.

Upload: others

Post on 28-Jun-2020

23 views

Category:

Documents


1 download

TRANSCRIPT

Page 1: THREAT MODELING - rocissa.org€¦ · THREAT MODELING Identifying, enumerating, ... Threat modelling works to identify, communicate, ... After the risks to the application have been

1

THREAT MODELING

Identifying, enumerating, and prioritizing potential threats to the business.

Page 2: THREAT MODELING - rocissa.org€¦ · THREAT MODELING Identifying, enumerating, ... Threat modelling works to identify, communicate, ... After the risks to the application have been

In addition to my day-to-day software development work at Calero, I participate on an internal security team to promote secure development practices, conduct threat modeling, and support security initiatives.

Senior Software EngineerCalero Software

2

ABOUTME

@jimkeeler

[email protected]

Rochester Chapter LeaderOWASP

Page 3: THREAT MODELING - rocissa.org€¦ · THREAT MODELING Identifying, enumerating, ... Threat modelling works to identify, communicate, ... After the risks to the application have been

3

VULNERABILITYMANAGEMENT

Page 4: THREAT MODELING - rocissa.org€¦ · THREAT MODELING Identifying, enumerating, ... Threat modelling works to identify, communicate, ... After the risks to the application have been

Threat modelling works to identify, communicate, and understand threats and mitigations within the context of protecting something of value.

A process to validate the

model, threats, and remediation

actions.

Design, description, or model of what you’re building.

A list of potential threats and actions.

A list of assumptions that can be checked or challenged.

4

WHAT ISTHREAT MODELING?

Page 5: THREAT MODELING - rocissa.org€¦ · THREAT MODELING Identifying, enumerating, ... Threat modelling works to identify, communicate, ... After the risks to the application have been

5

WHY THREAT MODEL?

Build a secure design

Efficient investmentof resources

Shared understanding

Threat and compliance risk

Create required controls

Balance riskscontrols, and usability

Documented threatsand mitigation

Business goals are protected

Page 6: THREAT MODELING - rocissa.org€¦ · THREAT MODELING Identifying, enumerating, ... Threat modelling works to identify, communicate, ... After the risks to the application have been

What are we building?

What can go wrong?

What are we going to do?

Did we do a good enough job?

6

FOURQUESTIONS

Page 7: THREAT MODELING - rocissa.org€¦ · THREAT MODELING Identifying, enumerating, ... Threat modelling works to identify, communicate, ... After the risks to the application have been

7

WHAT AREWE BUILDING?We must define the scope of the threat model using architecture diagrams, data flow transitions, data classifications, and people from different roles.

Page 8: THREAT MODELING - rocissa.org€¦ · THREAT MODELING Identifying, enumerating, ... Threat modelling works to identify, communicate, ... After the risks to the application have been

8

WHAT CANGO WRONG?We research the main threats that apply to our scope.

Page 9: THREAT MODELING - rocissa.org€¦ · THREAT MODELING Identifying, enumerating, ... Threat modelling works to identify, communicate, ... After the risks to the application have been

9

WHAT ARE WEGOING TO DO?We will turn our findings into specific actions.

Page 10: THREAT MODELING - rocissa.org€¦ · THREAT MODELING Identifying, enumerating, ... Threat modelling works to identify, communicate, ... After the risks to the application have been

10

DID WE DO A GOODENOUGH JOB?We will examine the quality, feasibility, progress, and planning.

Page 11: THREAT MODELING - rocissa.org€¦ · THREAT MODELING Identifying, enumerating, ... Threat modelling works to identify, communicate, ... After the risks to the application have been

11

RISK RATING

Estimating risk that vulnerabilities bring to the business.

Page 12: THREAT MODELING - rocissa.org€¦ · THREAT MODELING Identifying, enumerating, ... Threat modelling works to identify, communicate, ... After the risks to the application have been

STANDARDRISK MODEL

Risk = Likelihood * Impact

12

Page 13: THREAT MODELING - rocissa.org€¦ · THREAT MODELING Identifying, enumerating, ... Threat modelling works to identify, communicate, ... After the risks to the application have been

An individual or group that can manifest a threat.

A weakness which can be exploited by a threat agent, such as an attacker, to

perform unauthorized actions.

Threat Agent Vulnerability

13

FACTORS FOR ESTIMATING LIKELIHOOD

Page 14: THREAT MODELING - rocissa.org€¦ · THREAT MODELING Identifying, enumerating, ... Threat modelling works to identify, communicate, ... After the risks to the application have been

0 1 2 3 4 5 6 7 8 9

How technically skilled is this group of agents?

How motivated is this group of agents to find and exploit this vulnerability?

What resources are required for this group of agents to find and exploit this vulnerability?

How large is this group of threat agents?

14

THREAT AGENT FACTORS

Skill Level

Motive

Opportunity

Size

Page 15: THREAT MODELING - rocissa.org€¦ · THREAT MODELING Identifying, enumerating, ... Threat modelling works to identify, communicate, ... After the risks to the application have been

0 1 2 3 4 5 6 7 8 9

How easy is it for this group of threat agents to discover this vulnerability?

How easy is it for this group of threat agents to actually exploit this vulnerability?

How well known is this vulnerability to this group of threat agents?

How likely is an exploit to be detected?

15

VULNERABILITY FACTORS

Ease of discovery

Ease of exploit

Awareness

Intrusion detection

Page 16: THREAT MODELING - rocissa.org€¦ · THREAT MODELING Identifying, enumerating, ... Threat modelling works to identify, communicate, ... After the risks to the application have been

These factors are aligned with the traditional security areas of concern: confidentiality, integrity, availability,

and accountability.

Business impacts are dependent on what is important to the business. Common areas include financial

damage, reputation damage, non-compliance, and privacy violation.

Technical Business

16

FACTORS FOR ESTIMATING IMPACT

Page 17: THREAT MODELING - rocissa.org€¦ · THREAT MODELING Identifying, enumerating, ... Threat modelling works to identify, communicate, ... After the risks to the application have been

0 1 2 3 4 5 6 7 8 9

How much data could be disclosed and how sensitive is it?

How much data is corrupted and how damaged is it?

How much service could be lost and how vital is it?

Are the threat agents’ actions traceable to an individual?

17

TECHNICAL IMPACT FACTORS

Loss of confidentiality

Loss of integrity

Loss of availability

Loss of accountability

Page 18: THREAT MODELING - rocissa.org€¦ · THREAT MODELING Identifying, enumerating, ... Threat modelling works to identify, communicate, ... After the risks to the application have been

0 1 2 3 4 5 6 7 8 9

How much financial damage will result from an exploit?

Would an exploit result in reputation damage that would harm the business?

How much exposure does non-compliance introduce?

How much personally identifiable information could be disclosed?

18

BUSINESS IMPACT FACTORS

Financial damage

Reputation damage

Non-compliance

Privacy violation

Page 19: THREAT MODELING - rocissa.org€¦ · THREAT MODELING Identifying, enumerating, ... Threat modelling works to identify, communicate, ... After the risks to the application have been

19

DETERMININGSEVERITY

Threat Agent Vulnerability Technical Business

L I1 I2

Page 20: THREAT MODELING - rocissa.org€¦ · THREAT MODELING Identifying, enumerating, ... Threat modelling works to identify, communicate, ... After the risks to the application have been

0 to < 3 3 to < 6 6 to 9

20

LIKELIHOOD AND IMPACT LEVELS

LOW MEDIUM HIGH

Page 21: THREAT MODELING - rocissa.org€¦ · THREAT MODELING Identifying, enumerating, ... Threat modelling works to identify, communicate, ... After the risks to the application have been

HIGH Medium High Critical

MEDIUM Low Medium High

LOW Note Low Medium

LOW MEDIUM HIGH

LIKELIHOOD

21

OVERALL RISKSEVERITY

IMPA

CT

Page 22: THREAT MODELING - rocissa.org€¦ · THREAT MODELING Identifying, enumerating, ... Threat modelling works to identify, communicate, ... After the risks to the application have been

22

EXAMPLE

Our software has a URL tampering vulnerability that allows users in a specific role to view and user profile data on a multi-tenant system; including tenants that they do not belong to.

There are only a small handful of people assigned to this role and we log all access to this data. Unfortunately the logs are not reviewed regularly and the message does not include which user accessed the data.

Engineering is estimating that a rewrite of the entire role based access controls is necessary to fix this vulnerability.

Page 23: THREAT MODELING - rocissa.org€¦ · THREAT MODELING Identifying, enumerating, ... Threat modelling works to identify, communicate, ... After the risks to the application have been

THREAT AGENT FACTORS

SKILLLEVEL MOTIVE OPPORTUNITY SIZE

5 2 7 1

23

EXAMPLE

VULNERABILITY FACTORS

EASE OF DISCOVERY

EASE OF EXPLOIT AWARENESS INTRUSION

DETECTION

3 6 9 2

TECHNICAL IMPACT

LOSS OF CONFIDENTIALITY

LOSS OF INTEGRITY

LOSS OF AVAILABILITY

LOSS OF ACCOUNTABILITY

9 7 5 8

BUSINESS IMPACT

FINANCIAL DAMAGE

REPUTATION DAMAGE NON-COMPLIANCE PRIVACY

VIOLATION

1 2 1 5

Page 24: THREAT MODELING - rocissa.org€¦ · THREAT MODELING Identifying, enumerating, ... Threat modelling works to identify, communicate, ... After the risks to the application have been

24

DETERMININGSEVERITY

Threat Agent Vulnerability Technical Business

4.375 7.25 2.25MEDIUM HIGH LOW

Page 25: THREAT MODELING - rocissa.org€¦ · THREAT MODELING Identifying, enumerating, ... Threat modelling works to identify, communicate, ... After the risks to the application have been

OVERALL RISK SEVERITY

HIGH Medium High Critical

MEDIUM Low Medium High

LOW Note Low Medium

LOW MEDIUM HIGH

LIKELIHOOD

25

DETERMININGSEVERITY

IMPA

CTLOW

HIGH

MEDIUM

Low

Page 26: THREAT MODELING - rocissa.org€¦ · THREAT MODELING Identifying, enumerating, ... Threat modelling works to identify, communicate, ... After the risks to the application have been

26

DECIDING WHATTO FIX

After the risks to the application have been classified there will be a prioritized list of what to fix. As a general rule, the most severe risks should be fixed first. It simply doesn't help the overall risk profile to fix less important risks, even if they're easy or cheap to fix.

Page 27: THREAT MODELING - rocissa.org€¦ · THREAT MODELING Identifying, enumerating, ... Threat modelling works to identify, communicate, ... After the risks to the application have been

Choose factors that better represent what’s important for the organization.

The options associated with each factor will be much more effective if

customized to the business.

You can weight factors to emphasize the factors that are more significant for

the specific business.

Adding factors Customizing options Weighting factors

27

CUSTOMIZING THE RISK RATING MODEL

Page 28: THREAT MODELING - rocissa.org€¦ · THREAT MODELING Identifying, enumerating, ... Threat modelling works to identify, communicate, ... After the risks to the application have been

28

WHAT’S NEXT?

Don’t stop threat modeling!

Work through existing applications and systems

Model all new system designs

Integrate it into your SDL

Page 29: THREAT MODELING - rocissa.org€¦ · THREAT MODELING Identifying, enumerating, ... Threat modelling works to identify, communicate, ... After the risks to the application have been
Page 30: THREAT MODELING - rocissa.org€¦ · THREAT MODELING Identifying, enumerating, ... Threat modelling works to identify, communicate, ... After the risks to the application have been

Credits

Microsoft® and PowerPoint® are trademarks or registered trademarks of Microsoft Corporation.

© 2015 Google Inc, used with permission. Google and the Google logo are registered trademarks of Google Inc.

Google Drive® is a registered trademark of Google Inc.

Photos in this template were downloaded from pixabay.com Attribution is located in each slide notes and the Credits slide.

The Template provides a theme with four basic colors:

The backgrounds were created by Free Google Slides Templates.

Vectorial Shapes in this Template were created by Free Google Slides Templates and downloaded from FreePik.com.

Icons in this Template are part of Google® Material Icons and flaticons.com.

Shapes & Icons Backgrounds Images

Fonts Color Palette TrademarksThe fonts used in this template are taken from Google fonts. ( Trebuchet, Arial)You can download the fonts from the following url: https://www.google.com/fonts/

#cc4125ff #999999ff

#ffffffff #222222ff

30