Threat Modeling - Part 4
What will we learn?
- System Threat Modeling approaches 
- Unconventional Threat Modeling Techniques 
- Contrasting Threat Modeling approaches 
- Success Criteria 
- Strategies for effective Threat Modeling 
- System Threat modeling with STRIDE 
System Threat Modeling Process
- Define Objectives and Security Requirements - Could be compliance driven like FISMA, PCI etc. 
- Could be management security objectives 
- Contractual requirements 
- Company policies 
 
- Define Scope → Technical Scope, Network, Components, apps and more - Larger your scope the more time consuming and the more diluted your Threat Model is 
- Bound your scope 
- Threat models are iterative and need improvements over time so do not have an extensive scope 
 
- Decompose/Simplify Application - Data Flow Diagrams 
- Network Diagrams 
- Trust Boundaries and Zones. 
 
- Threat Assessment → Create likely Threat Scenarios 
- Next Steps → Mitigation/Risk, Attack Models, Vuln analysis and more. 
Success Factors
- Threat Model and then validate the Threat model with a pentest/VA/Red Team 
- Cross functional team for collaboration on the Threat Model 
- Time box these activities for optimal results 
- Get it done, don’t wait for perfect conditions (people, process, etc) 
General guidelines for a system Threat Model
We are assuming we have a network diagram or a DFD with Trust Zones/Boundaries to begin our modeling process.
- Map out the Escalation of Privileges Threats first 
- Map out the Spoofing Threats 
- Map out the Tampering Threats 
- Map out the Repudiation Threats 
- Map out the Information Disclosure Threats 
- Map out the Denial of Service Threats 
This is a good way to go about approaching your first pass at the Threat Modeling process.
Threat Modeling Strategies
- Brainstorming - Well D’uh
 
- Pre-Mortem Analysis - “Assumption of failure” 
- Think of horrible situations and build from there 
- Engages all folks including management/non-tech folks 
 
- Attack Trees - Attack trees are conceptual diagrams that show the variety of ways in which something can go wrong, and the reason why they might go wrong. A sample attack tree: - Source:NCSC 
 
- Movie style plotting 
- Elevation of Privilege Card game - Card game to help increase awareness and engagement in Threat Modeling activities 
- Sort of outdated now as it was created with Desktop applications in mind and not modern cloud infrastructure 
 
See you in the next one!