Threat Modeling
Written while completing the Threat Modeling Skills course by Adam Shostack, on LinkedIn Learning
Four-Question Framework
- What are we working on?(Assess Scope)
- What can go wrong?(Identify what can go wrong)
- What are we going to do about it?(Identify countermeasures/perform risk management)
- Did we do a good job?(Assess Work)
Steps
Decompose the Application
- how the application will be used and how it will react with external components
- (data) entry points
- (data) exit points
- assets
- trust levels
Determining and Ranking Threats using STRIDE
threat categorization
help identify threats from the attacker and
- spoofing(authentication)
- tampering(integrity)
- repudiation(non-repudiation)
- information disclosure(confidentiality)
- denial of service(availability)
- elevation of privilege(authorization)
risk=P(threat)*cost
Create a threat tree diagram
Risk Management
once the possible impact is identified, the associated risks can be-
- accept
- eliminate
- mitigate