introduction to threat modeling

18
An Intro to Threat Modelling :- Shivendra Saxena 1

Upload: inmobi-technology

Post on 14-Jul-2015

208 views

Category:

Technology


0 download

TRANSCRIPT

Page 1: Introduction to Threat Modeling

An Intro to Threat Modelling

:- Shivendra Saxena

1

Page 2: Introduction to Threat Modeling

About Me• Security Analyst @Flipkart

• 5+ yrs in security

• CEH, CISSP

Page 3: Introduction to Threat Modeling

What• Tool?

• Policy?

• Process?

• Procedure?

• All??

Page 4: Introduction to Threat Modeling

Who• Developers

• Architects

• Managers

• Everyone

Page 5: Introduction to Threat Modeling

How• Assets based

• Attacker based

• Software based

Page 6: Introduction to Threat Modeling

Random Gyan• Asset

• Threat

• Vulnerability

• Countermeasure

Page 7: Introduction to Threat Modeling

Assets• Things attackers want

• Things you want to protect

• Stepping stones to either of these

Page 8: Introduction to Threat Modeling

Assets

Page 9: Introduction to Threat Modeling

Attackers• Competitors

• State Sponsored

• Employees (Ex, Internal, Disgruntled)

• Partners/Suppliers

• Guy next door

Page 10: Introduction to Threat Modeling

Attackers

Page 11: Introduction to Threat Modeling

Software• DFDs

• Microsoft SDL

• TAM

Page 12: Introduction to Threat Modeling

Software

Page 13: Introduction to Threat Modeling

Sample

Page 14: Introduction to Threat Modeling

S.T.R.I.D.E.• Spoofing

• Tampering

• Repudiation

• Information Leakage

• Denial of service

• Escalation of Privilege

Page 15: Introduction to Threat Modeling

D.R.E.A.D.• Damage potential

• Reproducibility

• Exploitability

• Affected Users

• Discoverability

Page 16: Introduction to Threat Modeling

Advantages• Baseline

• Low Cost

• Dev Friendly

• Sturdy Applications

• Compliance

Page 17: Introduction to Threat Modeling

Further Reads

• Adam Shostack, Wiley

• Secure SDLC

• Application Threat Modeling

Page 18: Introduction to Threat Modeling

Demo

Will be served in the next meet :D