AN INTRODUCTION TO THREAT MODELING IN PRACTICE Thorsten Tarrach, - - PowerPoint PPT Presentation

an introduction to threat modeling in practice
SMART_READER_LITE
LIVE PREVIEW

AN INTRODUCTION TO THREAT MODELING IN PRACTICE Thorsten Tarrach, - - PowerPoint PPT Presentation

AN INTRODUCTION TO THREAT MODELING IN PRACTICE Thorsten Tarrach, Christoph Schmittner WHAT IS THREAT MODELING Introduction WHAT IS THREAT MODELING Structured Process Examination of a system for potential weaknesses


slide-1
SLIDE 1

AN INTRODUCTION TO THREAT MODELING IN PRACTICE

Thorsten Tarrach, Christoph Schmittner

slide-2
SLIDE 2

WHAT IS THREAT MODELING

Introduction

slide-3
SLIDE 3
  • Structured Process
  • Examination of a system for potential

weaknesses

WHAT IS THREAT MODELING

https://www.castlesworld.com/tools/motte-and-bailey-castles.php

slide-4
SLIDE 4

WHAT IS THREAT MODELING

https://www.castlesworld.com/tools/motte-and-bailey-castles.php https://deadliestwarrior.fandom.com/wiki/Huo_Chien

  • Systematic approach
  • Based on a conceptual model of

weaknesses and threats

  • Structured Process
  • Examination of a system for potential

weaknesses

slide-5
SLIDE 5

WHAT IS THREAT MODELING

  • Systematic approach
  • Based on a conceptual model of

weaknesses and threats

https://deadliestwarrior.fandom.com/wiki/Huo_Chien https://www.castlesworld.com/tools/concentric-castles.php

  • Structured Process
  • Examination of a system for potential

weaknesses

  • Resolving identified weaknesses
slide-6
SLIDE 6
  • Structured Process
  • Examination of a system for potential

weaknesses

  • Resolving identified weaknesses

WHAT IS THREAT MODELING

  • Systematic approach
  • Based on a conceptual model of

weaknesses and threats

  • Keeping the model of weaknesses

and threats current

https://www.castlesworld.com/tools/concentric-castles.php https://www.pbs.org/video/1812-niagara-frontier-fort-george-cannon-firing/

slide-7
SLIDE 7

STRIDE

THREAT MODEL

slide-8
SLIDE 8
  • Spoofing
  • Person or program successfully

impersonate someone else

STRIDE

https://www.amazon.com/Moustache-Sailor-Fancy-Costume-Outfit/dp/B07QXT3C26

slide-9
SLIDE 9
  • Tampering
  • Modify something in a way which is

not desired by the considered stakeholder

STRIDE

https://www.pinterest.at/pin/477311260477998586/

slide-10
SLIDE 10
  • Repudiation
  • Actions cannot be assigned to a

person or program

STRIDE

slide-11
SLIDE 11
  • Information disclosure
  • Sensitive information becomes known

to people who should not know it

STRIDE

https://www.tarses.com/blog/%EF%BB%BFlandlords-do-not-have-x-ray-vision-like-superman/

slide-12
SLIDE 12
  • Denial of Service
  • Resource or service is made

temporarily or indefinitely unavailable

STRIDE

slide-13
SLIDE 13
  • Elevation of Privilege
  • Gain elevated privileges

STRIDE

https://tvtropes.org/pmwiki/pmwiki.php/Main/TotemPoleTrench

slide-14
SLIDE 14
  • We model the system as a dataflow

diagram

  • Processes, data stores, external

elements communicate with each

  • ther over dataflows
  • And we define susceptibilities for the

elements based on STRIDE

14 26/02/2020

APPLY THIS TO IT – STANDARD WAY

S T R I D E Process X X X X X X Data flow X X X External element X X Data store X X X

slide-15
SLIDE 15
  • Works for a rough system draft
  • Less suited for systems modeled in more details
  • There is a connection, but no intended data flow
  • Also challenging if the threat model is more concrete
  • How to describe known issues or weaknesses
  • If there is no time stamp or version number in an update an attacker could cause

a downgrade

  • Difficult for certification, missing traceability

ISSUES

15 26/02/2020

slide-16
SLIDE 16

AIT APPROACH FOR THREAT MODELING

Developed for embedded systems and integrated in model-based engineering

slide-17
SLIDE 17

MODEL-BASED ENGINEERING

Security Model

  • ThreatGet is

integrated into Enterprise Architect

  • Extensive model

library with security properties and common domain elements

slide-18
SLIDE 18

DOMAIN ELEMENTS

Domain Elements

  • Set of common

elements for a domain

  • Inheritance and

Refinement

  • Customizable
slide-19
SLIDE 19

SECURITY PROPERTIES

Security Properties

  • Relevant security

properties

  • Assignable to

elements

  • Customizable
slide-20
SLIDE 20

AUTOMATED SECURITY ASSESSMENT

Rule Engine

  • Rules describe

potential weaknesses

  • Custom made

Grammar

  • Multi-hops attacks
  • Usage of multiple

databases

slide-21
SLIDE 21

VERSIONING

Traceability of Analysis

  • For each analysis a

snapshot of the model is generated

  • Snapshot +

analysis reports is marked with date and time

  • Stored in the model
slide-22
SLIDE 22

THREATGET – COOPERATIVE THREATMODELING

Web-based Backend Knowledge Base Analysis Engine

EA Addin Modelling Risk Management EA Addin Modelling Risk Management EA Addin Modelling Risk Management EA Addin Modelling Risk Management

slide-23
SLIDE 23

AUTOMATED THREAT INTELLIGENCE UPDATES

Web-based Backend AIT Knowledge Base Threat Intelligence STIX, Structured Threat Information eXpression CVE, Common Vulnerabilities and Exposures … User Knowledge Base

AIT Review and Translation

slide-24
SLIDE 24

THREAT INTELLIGENCE – AUTOMOTIVE EXAMPLE

24 26/02/2020

AIT Knowledge Base >1400

>100 Threats UNECE WP29 >200 Threats ITU >300 Threats ETSI >400 Threats AIT analysis >400 Threats External sources

UNECE WP29: World Forum for Harmonization of Vehicle Regulations ETSI: European Telecommunications Standards Institute (V2X in Europe) ITU: International Telecommunication Union

slide-25
SLIDE 25

THREATGET

Example

25 26/02/2020

slide-26
SLIDE 26

THREATGET

Summary

slide-27
SLIDE 27

THREATGET - THREAT ANALYSIS AND RISK MANAGEMENT

Cybersecurity expertise Modeling knowhow Domain knowledge ThreatGet

Threat Analysis Report

Benefits

  • Automated threat

analysis based on current threat intelligence

  • Traceability from

threats to requirements

  • Continuous process,

integrated with model- based engineering https://www.threatget.com/

slide-28
SLIDE 28

THANK YOU!

Thorsten Tarrach, Christoph Schmittner