Threat Model:�Why? What? How?
Brook S.E. Schoenfield
Principal Software Security Strategist, True Positives, LLC
Advisor, Resilient Software LLC
Author, consultant
Passionate security architect
Curiouser and curiouser
1
Would you indulge me in some context?
Many thanks!
2
We are all collateral damage
Attack and the subsequent “compromise,” …is utterly pervasive: constant and continual. Many attackers are intelligent and adaptive”
Brook S.E. Schoenfield, Securing Systems, © 2015
3
Context
4
Buried deep
5
The State Of Software Security Art
Secure Design
Incident Management
Static Analysis
Web App scan
Fuzzing
Penetration Test
Risk Rating
Threat intelligence
Secure coding
Code review
Threat Model
IAST
API Vulnerability Scan
OpsSec
3rd Party Code
Assurance, Dependency & Patching
Build/Deploy/Update
Security
6
leading cybersecurity company protecting customers from all cyber threats
It’s about securing the code as fast as you write it
strategic security solution that covers all your security gaps
Vendor Marketing
Emphases, mine
7
This is our world
Image: depositphotos
8
Drivers’Threat Model
9
Is This Useful?
Spoof
Tamper
Repudiation
Information disclosure
Denial of service
Elevation of privilege
Spoof
Tamper
Repudiation
Information disclosure
Denial of service
Elevation of privilege
Spoof
Tamper
Repudiation
Information disclosure
Denial of service
Elevation of privilege
Spoof
Tamper
Repudiation
Information disclosure
Denial of service
Elevation of privilege
Architecture from Securing Systems © 2015, Brook S.E. Schoenfield, all rights reserved
10
11
Any
controls
missing?
New dev
12
13
Threat modeling is analyzing representations of a system to highlight concerns about security and privacy characteristics.��
14
The best use of threat modeling is to improve the security and privacy of a system through early and frequent analysis.
The outcomes of threat modeling are meaningful when they are of value to stakeholders.
https://www.threatmodelingmanifesto.org/
Threat modeling must align with an organization’s development practices and follow design changes in iterations that are each scoped to manageable portions of the system.
Dialog is key to establishing the common understandings that lead to value, while documents record those understandings, and enable measurement.
15
Recurring Problems
16
Threat Model Types�Superset top to bottom
17
Threat Model Must Provide
18
Threat Model Analysis In a Nutshell
19
Threat model led by Jakub Kaluzny, Open Security Summit, 2020
20
Original threat model led by Jakub Kaluzny, Open Security Summit, 2020
21