threat modeling part 1 - overview

17
Threat Modeling Part 1 - Overview Brad Andrews , CISSP, CSSLP North Texas Cyber Security Conference 2015

Upload: north-texas-chapter-of-the-issa

Post on 07-Aug-2015

390 views

Category:

Internet


3 download

TRANSCRIPT

Page 1: Threat Modeling Part 1 - Overview

Threat ModelingPart 1 - Overview

Brad Andrews , CISSP, CSSLPNorth Texas Cyber Security Conference

2015

Page 2: Threat Modeling Part 1 - Overview

Long time in the tech field Wide range of jobs – Defense, Online,

Banking, Airlines, Doc-Com, Medical, etc. 20+ Years software development

experience 10+ in Information Security M.S. and B.S. in Computer Science from the

University of Illinois Active Certifications – CISSP, CSSLP, CISM

Who Am I?

Page 3: Threat Modeling Part 1 - Overview

Work for one of the largest providers of pharmacy software and services in the country

Serve as Lead Faculty-Area Chair and for Information Systems Security for the University of Phoenix Online Campus

Carry out independent reading and research for my own company, RBA Communications

My Work

Page 4: Threat Modeling Part 1 - Overview

The views and opinions expressed in this session are mine and mine alone. They do

not necessarily represent the opinions of my employers or anyone associated with

anything!

My Opinions and Ideas Alone

Page 5: Threat Modeling Part 1 - Overview

Part 1 – Threat Modeling Overview Part 2 – Applying STRIDE to a System Part 3 – Applying DREAD to a System

Sessions Today

Page 6: Threat Modeling Part 1 - Overview

What is It? Why is It Important? How Do You Do It? Flow Diagrams are Important! Some Dangers to Avoid

Threat Modeling Overview

Page 7: Threat Modeling Part 1 - Overview

Figuring out all the significant threats to the system.

Microsoft has good guidance◦ I borrow from Adam Shostack later

Good overview at https://www.owasp.org/index.php/Threat_Risk_Modeling

What is Threat Modeling?

Page 8: Threat Modeling Part 1 - Overview

Threat Modeling Lessons from Star Wars (and Elsewhere)

https://youtu.be/KLpgaoD8ySM

Good Background Videoby Adam Shostack

Page 9: Threat Modeling Part 1 - Overview

We need to protect our systems Always limited time, people and money Must prioritize and focus Knowing the most important threats allows

this

It has had good results Not a panacea, just a part of the process

Why Model Threats?

Page 10: Threat Modeling Part 1 - Overview

Know the System

Find Threats

Detail ThreatsRank Threats

Protect Against Threats

How Do You Do It?

Page 11: Threat Modeling Part 1 - Overview

You need to know system interfaces and data flows to find out where it could be vulnerable.

Missing in too many cases! Don’t have to be perfect, just good enough. Visio may be worthwhile, though even Paint

can be used.

Flow Diagrams are Important

Page 12: Threat Modeling Part 1 - Overview

Trap #1 – You are never done◦ Ongoing process, but endpoints along the way

Trap #2 – Monolithic processes◦ Realize systems have many parts

Trap #3 – A single way to threat model◦ Use what works, not just a single formal process

Trap #4 – Working in a vacuum◦ All systems interact with other systems, not just

end users.

Dangers to Avoid (from Adam

Shostack)

Page 13: Threat Modeling Part 1 - Overview

Trap #5 – Threat modeling is an innate skill◦ Some have a better mindset for it, but all can

develop the needed skills◦ Improvement comes with time and practice

Trap #6 – Threat modeling is a single skill◦ Techniques – Know different approaches◦ Knowledge – Know useful data (threats/risks,

patterns, etc.) Trap #7 – Think like an attacker

◦ Limited ability to think outside your own experience

◦ Follow checklists as needed

Dangers to Avoid 2 (from Adam

Shostack)

Page 14: Threat Modeling Part 1 - Overview

Trap #8 – One model to rule them all◦ Model of the system◦ Model of the threats◦ Model of the attacker or user

Trap #9 – Focus only on the threats◦ Also consider the impact of requirements, threats

and mitigations Trap #10 – Waiting too long

◦ Earlier is almost always better, though review and repeat as necessary.

Dangers to Avoid 3 (from Adam

Shostack)

Page 15: Threat Modeling Part 1 - Overview

Be Involved Don’t Monopolize Work Together

Interactive Time

Page 16: Threat Modeling Part 1 - Overview

Work through an example system

Amazon is a good system to consider since most have purchased on their site

Develop a Data Flow Diagram

Page 17: Threat Modeling Part 1 - Overview

Questions?