vgtu intro to threats 2015

29
Information systems threat modeling VGTU 2015

Upload: slicklash

Post on 23-Jan-2018

430 views

Category:

Technology


1 download

TRANSCRIPT

Page 1: VGTU Intro to Threats 2015

Information systemsthreat modelingVGTU 2015

Page 2: VGTU Intro to Threats 2015

About me

Audrius Kovalenko | @slicklash

NOT Computer Security Expert

Just a developer

Page 3: VGTU Intro to Threats 2015

Which one is more secure?

Page 5: VGTU Intro to Threats 2015

What’s a “secure” system?

Page 6: VGTU Intro to Threats 2015

What’s a “secure” system?

Good security = Prevention + Detection + Response

Page 7: VGTU Intro to Threats 2015

Security properties

Authentication

Integrity

Non-repudiation

Confidentiality

Availability

Authorization

Page 8: VGTU Intro to Threats 2015

Security threats

Authentication Spoofing

Integrity Tampering

Non-repudiation Repudiation

Confidentiality Information Disclosure

Availability Denial of Service

Authorization Elevation of Privilege

STRIDE

Page 9: VGTU Intro to Threats 2015

SpoofingSTRIDE

Page 10: VGTU Intro to Threats 2015

TamperingSTRIDE

Dr. David Warren

Page 11: VGTU Intro to Threats 2015

RepudiationSTRIDE

Page 12: VGTU Intro to Threats 2015

Information disclosureSTRIDE

Hacked Same Password Success

Page 13: VGTU Intro to Threats 2015

Denial of serviceSTRIDE

Page 14: VGTU Intro to Threats 2015

Elevation of privilegeSTRIDE

Page 15: VGTU Intro to Threats 2015

Lack of security designlast minute fixes

Page 16: VGTU Intro to Threats 2015

Securing the designthreat modeling

Page 17: VGTU Intro to Threats 2015

What are you building?data flow diagram

Page 18: VGTU Intro to Threats 2015

Decompositionroles

User Roles

Name Description AuthenticationAdmin Administrators have complete and unrestricted access to Notices, Partner Accounts and Logs. Windows

Partner Partners can create, read and update Notices. Basic

User Users can read and update Notices. Forms

Service Roles

Name Description Authentication

APP Role Identity APP is running as. Windows Integrated (ApplicationPoolIndentity)

SVC Role Identity SVC is running as. Windows Integrated (Local System)

MSMQ Role Identity MSMQ is running as. Windows Integrated (Network Service)

Page 19: VGTU Intro to Threats 2015

Decomposition (2)components

Components

Name Roles Type Run As Communication Channel Technology Uses

APP AdminUser

Website APP Role HTTPS C#, ASP.NET MVC 5 Cryptography,File I/O

API Partner Website API Role HTTPS C#, ASP.NET MVC 5 Cryptography,File I/O

SVC MSMQ Windows Service

SVC Role TCP/IP C# Cryptography,File I/O

Page 20: VGTU Intro to Threats 2015

Decomposition (3)data

Data

Name Description Data Elements Data Stores

Form Defines structure of a Notice Fields Database

Access Control

Role Access Control Remarks

Admin C R U D

Partner R Limited information. Form must be published.

User

Page 21: VGTU Intro to Threats 2015

What can go wrong?card games

Page 22: VGTU Intro to Threats 2015

What can go wrong? (2)checklists

CAPEChttps://capec.mitre.org/data/index.html

OWASP ASVShttps://www.owasp.org/index.php/Category:OWASP_Application_Security_Verification...

OWASP AppSensorhttps://www.owasp.org/index.php/AppSensor_DetectionPoints

Page 23: VGTU Intro to Threats 2015

How to prioritize?convert threat to risk

Risk

Loss eventfrequence

Loss magnitude

Threat eventfrequence

prob. Threat agent actions result in loss

Page 24: VGTU Intro to Threats 2015

How to mitigate?raise the cost

Time

Skills

Money

etc.

capability

Page 25: VGTU Intro to Threats 2015

How to make it work for you?

Practice

Experience

Reflection

Theory

find your own way

Page 26: VGTU Intro to Threats 2015

Books

http://www.cl.cam.ac.uk/~rja14/book.html

Page 27: VGTU Intro to Threats 2015

Books

FAIR STRIDE PASTA

Page 29: VGTU Intro to Threats 2015

QA