Threat Modeling for Developers
Jonathan Marcil
Summary
Who am I?
Threat Modeling Utopia
What happens if you give a lot of time to brainstorm, edit and reach friendly consensus to 15 people with diverse backgrounds?
👉You get a Manifesto and � a Catalog of Capabilities
What your organization can do for threat modeling
Developer std environment
What happens when you subdue highly intelligent people into delivering software amidst chaos?
👉They get very resilient, � especially to diversions, � and focus on their goals
And now,�let’s bring both worlds together
38 Threat Modeling Capabilities
38 Threat Modeling Capabilities
😂
Can you recall 7 of them?
Take a deep breath of air,
perhaps a sip of water,�and carry on…
Who are you? What to do
Org size matters
Org size is about scale
Let’s play WIN or FAIL!�
Vote with 👍 or 👎
Each example is tied to a Capability, but omits details. Refer to slide notes for the original Capabilities website text.
Strategy / Resource Allocation
The organization has mandated the security team to create a threat modeling program. Dedicated resources on the team have been given time to focus on the program and perform threat modeling.
Developers had to provide information required to create the model and to make changes from outcomes, yet the organization didn’t give them more time.��Make it part of the official tasks for developers, not just security!
Time squeeze ==☹️
Education / Active Practice
The organization has invested in training and enrolled everyone, including the developers and security into a video based training that provides examples while introducing fundamentals.
Training was set with a due date to ensure completion.
Developers often don’t have time to reflect on theoretical applications and just apply them retroactively. Quickly, what was learned is lost.��Perform training alongside a real threat modeling session, by having a live hands-on training that uses the current developed system.
Direct context ==🙂
Creating / System and Threat Comprehension
The organization has properly trained everyone on a threat modeling methodology, given them dedicated time to create threat models.
Developers are asked to produce an initial threat model that after is reviewed by security to add threats and mitigations.
People involved know about the system and have expertise to identify threats, which result into producing a quality model.
�But wait…
Creating / Active Collaboration
The organization has properly trained everyone on a threat modeling methodology, given them dedicated time to create threat models.
Developers are asked to produce an initial threat model that security reviews after to add threats and mitigations.
People don’t collaborate, thus reinforcing a culture of blame and pretend compliance.�
Have teams work together on the model in a non-adversarial manner instead of passing a document to each other.
But wait there’s more…
Communications / Constructive Conversations
The organization has properly trained everyone on a threat modeling methodology, given them dedicated time to create threat models.
Threat models are done with teams working together in a non-adversarial manner.
The peer-to-peer collaboration has evolved into productive dialogues to share knowledge and experiences.��Developers learn threats from security and security is better informed on what are the systems they have to secure.
Collab multiplier ==🙂
Acting / Seamless Alignment
Program Management / Value-Driven
The organization has positioned Threat Modeling where its outcomes can influence system designs.
That added value to the development process is demonstrated in the program at the organizational level.
Developers feel that the Threat Modeling Program is aligned with their main goals and take pride into creating better systems.
recognize the value added proposition
The key is to have developers by tying it to their goals.
Bonus slide
Izar is to blame if I go over time
Vulnerabilities are everywhere!
There’s a breach right now and there’s so many things that need to be fixed!
Don’t Threat Model. Help resolving the issues.
Observe and take notes… these will be priority threats for your organization.
Take time after recovery to incorporate lesson learned into threat modeling.
Today’s
Can be tomorrow’s
Thanks!
Slides and links on:
https://about.jonathanmarcil.ca →
Special thanks to:
Izar for the review
The Threat Modeling Group
ConFoo 2024
OWASP France
https://www.threatmodelingmanifesto.org/