Threat Modeling
As the process of describing probable adverse effects on our assets caused by specific threats sources.
When we do threat modeling….what do we consider
Attack Trees
Is a graph showing how individual actions by attackers can be chained together to achieve their goals.
Attack tree lend themselves to a methodology known as reduction analysis….there are 2 aspects:
STRIDE
Developed by Microsoft in 1999
Is a threat modeling framework that evaluates a system’s design using flow diagrams, systems entities, and events related to a system.
The Lockheed Martin Cyber Kill Chain
7 Stages of the Lockheed Martin Cyber Kill Chain
STRIDE
Mnemonic
S - Spoofing
T - Tampering
R - Repudiation
I - information Disclosure
D - Denial of Service
E - Elevation of Privilege
Cyber Kill Chain is a high level framework
It is one of the most commonly used one for modeling threats
MIRATE Corporation developed a framework of…
Adversarial Tactics, Techniques & Common Knowledge called ATT&CK as a comprehensive tactics and techniques used by threat actors
- 14 Tactics contains a number of techniques—> sub-techniques
Why Bother with threat modeling
Threat modeling allows us to simplify some of the activities of our adversaries so we can drill into the parts that really matter to us as defenders.
Basic Security questions 3 questions:
Defence in Depth
Zero Trust
Trust But Verify
Basically mean that, even when an entity and its behaviours are trusted, we should double-check both
Shared Responsibility
Refers situation in which a service provider is responsible for certain security controls, while the customer is responsible for others.
Separation of Duties
SoD, in which important functions are divided among multiple individuals to ensure that no one person has the ability to intentionally or accidentally cause serious losses to the organization.
Least Privilege
Authorization Creep
As Employees work at an organization over time and move from one department to another, they often are assigned more and more access rights and permissions.
Keep it Simple
The more complex a system is, the more difficult it is to understand and protect it. Simplicity is the key.
Secure Defaults
Fail Securely
In the even of an error, information systems ought to be designed to behave in a predictable and non compromising manner.
Privacy by design
Security Model
A Security model is a more formal way to capture secure principles. Where a principle is a rule of thumb that can be adapted to different situations, the security models we describe here are very specific and verifiable.