Who is typically the owner of Threat Model and what does he?
technical project manager which also schedules analysis sessions
Mitigation –>
to address or lessen a problem:
- protect users
- design secure software
Security by Obscurity =
Verstecken/Verschleiern der Security
Different Threats affect…
different types
Mitigation Process:
4 ways to address threats:
Overview of Mitigation Techniques categorized in STRIDE
Inventing mitigations is…
hard - be careful!
- Mitigations are an area of expertise
- Amateurs make mistakes, but so do pros
- Mitigation failures may appear to work… until they don’t
- When you need to invent mitigations, get expert support
Any residual risk –>
escalated for management review if this threat is acceptable
Validate and Review may lead to:
Validating Threat Models is…
important!
When validating the Threat Model it is important to..
validate the whole Threat Model!
What questions can be asked during validating the Threat Model:
o Are threats enumerated?
o Minimum STRIDE per element that touches a trust boundary
o Has Test/QA reviewed the model?
o is each threat addressed?
o Are mitigations done right?
Final Security Review will make …
shipping more predictable.
Validate Quality of Threats –> Do they:
Validate Quality of Mitigations:
Put as much information as possible into the Threat Model like:
Tips for Threat Modelling:
Risk Rating –> Each threat is graded into … categories.
DREAD
DREAD:
Damage =
how bad would an attack be?
Reproducibility =
how easy is it to reproduce the attack?
Exploitability =
how much work is it to launch the attack?
Affected users =
how many people will be impacted?