AN INTRODUCTION TO THREAT MODELING IN PRACTICE
Thorsten Tarrach, Christoph Schmittner
AN INTRODUCTION TO THREAT MODELING IN PRACTICE Thorsten Tarrach, - - PowerPoint PPT Presentation
AN INTRODUCTION TO THREAT MODELING IN PRACTICE Thorsten Tarrach, Christoph Schmittner WHAT IS THREAT MODELING Introduction WHAT IS THREAT MODELING Structured Process Examination of a system for potential weaknesses
Thorsten Tarrach, Christoph Schmittner
WHAT IS THREAT MODELING
Introduction
weaknesses
WHAT IS THREAT MODELING
https://www.castlesworld.com/tools/motte-and-bailey-castles.php
WHAT IS THREAT MODELING
https://www.castlesworld.com/tools/motte-and-bailey-castles.php https://deadliestwarrior.fandom.com/wiki/Huo_Chien
weaknesses and threats
weaknesses
WHAT IS THREAT MODELING
weaknesses and threats
https://deadliestwarrior.fandom.com/wiki/Huo_Chien https://www.castlesworld.com/tools/concentric-castles.php
weaknesses
weaknesses
WHAT IS THREAT MODELING
weaknesses and threats
and threats current
https://www.castlesworld.com/tools/concentric-castles.php https://www.pbs.org/video/1812-niagara-frontier-fort-george-cannon-firing/
THREAT MODEL
impersonate someone else
STRIDE
https://www.amazon.com/Moustache-Sailor-Fancy-Costume-Outfit/dp/B07QXT3C26
not desired by the considered stakeholder
STRIDE
https://www.pinterest.at/pin/477311260477998586/
person or program
STRIDE
to people who should not know it
STRIDE
https://www.tarses.com/blog/%EF%BB%BFlandlords-do-not-have-x-ray-vision-like-superman/
temporarily or indefinitely unavailable
STRIDE
STRIDE
https://tvtropes.org/pmwiki/pmwiki.php/Main/TotemPoleTrench
diagram
elements communicate with each
elements based on STRIDE
14 26/02/2020
APPLY THIS TO IT – STANDARD WAY
S T R I D E Process X X X X X X Data flow X X X External element X X Data store X X X
a downgrade
ISSUES
15 26/02/2020
AIT APPROACH FOR THREAT MODELING
Developed for embedded systems and integrated in model-based engineering
MODEL-BASED ENGINEERING
Security Model
integrated into Enterprise Architect
library with security properties and common domain elements
DOMAIN ELEMENTS
Domain Elements
elements for a domain
Refinement
SECURITY PROPERTIES
Security Properties
properties
elements
AUTOMATED SECURITY ASSESSMENT
Rule Engine
potential weaknesses
Grammar
databases
VERSIONING
Traceability of Analysis
snapshot of the model is generated
analysis reports is marked with date and time
THREATGET – COOPERATIVE THREATMODELING
Web-based Backend Knowledge Base Analysis Engine
EA Addin Modelling Risk Management EA Addin Modelling Risk Management EA Addin Modelling Risk Management EA Addin Modelling Risk Management
AUTOMATED THREAT INTELLIGENCE UPDATES
Web-based Backend AIT Knowledge Base Threat Intelligence STIX, Structured Threat Information eXpression CVE, Common Vulnerabilities and Exposures … User Knowledge Base
AIT Review and Translation
THREAT INTELLIGENCE – AUTOMOTIVE EXAMPLE
24 26/02/2020
AIT Knowledge Base >1400
>100 Threats UNECE WP29 >200 Threats ITU >300 Threats ETSI >400 Threats AIT analysis >400 Threats External sources
UNECE WP29: World Forum for Harmonization of Vehicle Regulations ETSI: European Telecommunications Standards Institute (V2X in Europe) ITU: International Telecommunication Union
THREATGET
Example
25 26/02/2020
THREATGET
Summary
THREATGET - THREAT ANALYSIS AND RISK MANAGEMENT
Cybersecurity expertise Modeling knowhow Domain knowledge ThreatGet
Threat Analysis Report
Benefits
analysis based on current threat intelligence
threats to requirements
integrated with model- based engineering https://www.threatget.com/
Thorsten Tarrach, Christoph Schmittner