From Threat Discussion to Completed Mitigation:
Making your Threat Model Useful!
(Workshop)
Agenda
Who is Jono?
ThreatModelConnect: Jono-131�LinkedIn: jsosulska
Whether development, operations, advocacy or education … Every role I have ever had, has benefited by taking the time to Threat Model - Jono
Aquia is a Service-Disabled Veteran-Owned Small Business (SDVOSB) that specializes in transformative cloud and cybersecurity professional services for the public and private sectors. Learn more at aquia.us.
Trusted by
What is Aquia?
What do I want for you to get out of this activity?
Concepts Review: 4 Questions and the Manifesto
https://www.threatmodelingmanifesto.org/
Threat Description |
An attacker can inject a command that the system will run at a higher privilege level - ♔King♔ Elevation of Privilege Suit |
An attacker can use a shared key to authenticate as different principals confusing information in the logs - Nine Repudiation Suit |
Concepts Review: Threat Ideation and Identification
Elevation of Privilege Card Game
Do we understand “what [threat] is being worked on”, based on our role?
Do we know “what could go wrong” … based on the description as is?
What are we going to do to improve the description?
Concepts Review: Threat Ideation and Identification
Threat Description |
An attacker can inject an unknown command via a tampered container image being uploaded to an image registry, and deployed into a Kubernetes cluster to run at a higher privilege level, by squatting on the tag of an open source dependency - Modified ♔King♔Elevation of Privilege Suit |
An attacker can use a shared key to authenticate as different principals to a shared development account, confusing information in the logs
|
Elevation of Privilege Card Game
Concepts Review: Improving Threat Ideation and Identification
What can we improve about our descriptions?
Shared doc/wiki? Slid.io? Sticky notes?�
Advice: If only 2 people understand the work described, only 2 people can do the work described.
Concepts Review: Threat Mitigation
Threat Description | Threat Mitigation |
An attacker can inject an unknown command via a tampered container image being uploaded to an image registry, and deployed into a Kubernetes cluster to run at a higher privilege level by squatting on the tag of an open source dependency. |
|
An attacker can use a shared key to authenticate as different principals to a shared development account, confusing information in the logs. |
|
Concepts Review: Identifying Action Items & Questions
Threat Description | Threat Mitigation | Action Items & Questions |
An attacker can inject an unknown command via a tampered container image being uploaded to an image registry, and deployed into a Kubernetes cluster to run at a higher privilege level by squatting on the tag of an open source dependency. |
|
|
An attacker can assume a shared administrative role in a shared development account on a service or platform, confusing information in the logs. |
|
|
Activity Time! Please get out your phones, and go to the pages on each of the following slides. Each activity has a unique QR code and window for participation!
Drive Useful Threat Artifacts Exercise
After-workshop note: The following slides will be proxies of the activity, as well as some of the responses included. There is no QR codes, but the questions and responses are recorded
They will be broken down into the question, audience responses, and facilitator add-ons.�
Several questions extend across multiple slides. Slides 17-22 all apply to a single activity. See (Con’t) in the title.
Drive Useful Threat Artifacts: Improve the Threat Description
What would you do to improve this threat description?
An attacker can act as a "man in the middle" because you don't authenticate endpoints of a network connection" - 7 ID" E.g. "name the endpoints
Drive Useful Threat Artifacts: Describe Potential Mitigations (3 or Higher Votes)
What are some mitigations based on an AWS EKS architecture?
E.g. "implement service mesh with internal CA"
Drive Useful Threat Artifacts: Describe Potential Mitigations (1 Vote - Con’t)
What are some mitigations based on an AWS EKS architecture?
E.g. "implement service mesh with internal CA"
Drive Useful Threat Artifacts: Generate Additional Questions - All Responses!
What questions do you have about this threat? An attacker can act as a "man in the middle" because you don't authenticate endpoints of a network connection" - 7 ID
These are all broken out by groups in continuing slides!
Drive Useful Threat Artifacts: Generate Additional Questions - Technique-Based Questions (Con’t)
What questions do you have about this threat? An attacker can act as a "man in the middle" because you don't authenticate endpoints of a network connection" - 7 ID
Drive Useful Threat Artifacts: Generate Additional Questions - Authentication Based Questions (Con’t)
What questions do you have about this threat? An attacker can act as a "man in the middle" because you don't authenticate endpoints of a network connection" - 7 ID
Drive Useful Threat Artifacts: Generate Additional Questions - Privacy, Impact, & Risk Questions (Con’t)
What questions do you have about this threat? An attacker can act as a "man in the middle" because you don't authenticate endpoints of a network connection" - 7 ID
Drive Useful Threat Artifacts: Generate Additional Questions - Data Questions (Con’t)
What questions do you have about this threat? An attacker can act as a "man in the middle" because you don't authenticate endpoints of a network connection" - 7 ID
Drive Useful Threat Artifacts: Generate Additional Questions - Review (Con’t)
What questions do you have about this threat? An attacker can act as a "man in the middle" because you don't authenticate endpoints of a network connection" - 7 ID
As was apparent from the multitude of questions, a lot of different areas of information can be covered and captured in asking and answering questions.
Grouping questions is effective in order to understand a topic more completely, while also keeping from distracting people from the larger issue at hand.
Capturing these questions means that a solution will be more well informed - even from 10 minutes of silently capturing this in a workshop!
Drive Useful Threat Artifacts: Common Action Items
How do we know a mitigation is working?
How much of this threat is due to what we don’t know?
What factors affect impact and severity of this threat?
Break - 10 Minutes
The Threat Artifact -All Pieces Combined; An outline
Threat Description | Threat Mitigation | Action Items & Questions |
| | |
| | |
| | |
If you are just getting started, please use this basic outline to guide your session for your team. As your team practices more, you’ll definitely grow out of using this table!
Create Tickets for the Dev Team
Socialize your Threat Model Results
Return to your Threat Model process often
The Threat Artifact -All Pieces Combined; Now What?
I’ve got an Artifact, Now What? Create Sprint Tasks
Three-Part User Story:�As an audience, I would like a mitigation description, so that I may avoid threat description. To do this, I need to action item #1, action item #2, and spike on question #1.
Gherkin:
Feature: Mitigation Description
Scenario: threat actor performs threat description
When: audience performs threat description
And: …
Then: mitigation effect
And: additional validation of mitigation effect
…
I’ve got an Artifact, Now What? Socialize your results
Identify your audiences
Sage Advice From Rafiki
Rafiki: And “what are you going” to do about it?��Simba: I’m going back … (to my threat model!)
Sage Advice From Rafiki
I’ve got an Artifact, Now What? Return to your experiences
Return to Threat Models For Your Team:
I’ve got an Artifact, Now What? Return to your experiences
Return to Threat Models for Stakeholders and Dependencies:
Review!
Reflection (5 Min)
Interested in Learning More?
Send us a message
Download our white paper
Freeform Q&A - Prioritization
Freeform Q&A
Freeform Q&A - Risk
Freeform Q&A - General