Threat Modeling
Threat Modeling
Types of Cyber
History of
Security
Cyber Security
Threats
Introduction to Threat
Modeling
Understanding the Foundations of
Information Assurance and Security
Definition
Identifying Assets: Recognizing what is valuable and needs protection, such as sensitive
data, intellectual property, and critical systems.
Evaluating Risks: Determining the potential impact and likelihood of threats exploiting
vulnerabilities, which helps prioritize security efforts.
Modeling
continually emerge, requiring models to be
revisited and updated frequently.
• Resource Constraints for Smaller Organizations
o Challenge: Smaller teams may lack dedicated
security resources, making it hard to implement
thorough threat modeling practices.
o Impact: Limited budgets and staffing mean that
smaller organizations may have to prioritize only
their highest-risk assets, leaving other
vulnerabilities unaddressed.
Challenges in
• Balancing Security with User Experience and Development
Speed
o Challenge: Implementing robust security measures
Threat
can sometimes slow down development cycles or
add complexity to user interactions.
o Impact: Teams often face pressure to release
PASTA (Process for Attack Simulation and Threat Analysis): A risk-centric approach focusing
on business impacts, with a seven-stage process to simulate and analyze threats.
Attack Trees and Attack Path Analysis: Visual representations of attack paths to systematically
identify vulnerabilities in a system’s design.
What is Threat Modeling?
• Structured process to identify, evaluate, and mitigate
security threats in systems.
Why It Matters
• Early risk detection, resource optimization, regulatory
compliance, better incident response, and fosters a
security culture.
Key Challenges
Recap of Key Points • Identifying all threats, limited resources, balancing speed
with security, keeping models updated, and cross-team
alignment.
Intro to Frameworks (for Next Session)
• STRIDE: Categorizes threats (Spoofing, Tampering, etc.).
• PASTA: Business-risk focus.
• OCTAVE: Prioritizes critical assets.
• Attack Trees: Maps possible attack paths.
Threat Modeling Frameworks
STRIDE Threat Modeling
• R - Repudiation:
• Description: Denying an action after performing it, often to avoid blame or responsibility.
• Example: A user claims they never made a fraudulent transaction.
• Mitigation: Implement logging and auditing to provide proof of actions within the system.
• I - Information Disclosure:
• Description: Exposing sensitive information to unauthorized individuals.
• Example: A web application reveals private user data through a URL or unencrypted data in
transit.
• Mitigation: Use encryption for data at rest and in transit, and enforce strict access controls.
The Components of STRIDE
• Identify Assets and Entry Points: Begin by determining which assets are most valuable and
where attackers might interact with the system (entry points).
• Categorize Threats: For each entry point or asset, categorize potential threats using STRIDE.
This step involves analyzing how each STRIDE category could apply to each component of
the system.
• Prioritize Threats: Not all threats have the same level of risk. Assess the potential impact of
each identified threat and prioritize based on the likelihood and potential damage.
• Develop Mitigations: For each identified threat, determine appropriate countermeasures.
Focus on reducing the likelihood of the threat occurring or limiting its impact.
Benefits of STRIDE Threat Modeling
Scenario: Imagine you’re securing a basic e-commerce website. The system has user
login functionality, payment processing, and a product catalog.
• Task: Use the STRIDE framework to identify potential threats for each system
component.
• Follow-Up Discussion: After identifying threats, propose possible mitigation
strategies. For instance, discuss how adding encryption or access control might
reduce specific threats.
Key Takeaways