an introduction to threat modeling in practice
play

AN INTRODUCTION TO THREAT MODELING IN PRACTICE Thorsten Tarrach, - PowerPoint PPT Presentation

AN INTRODUCTION TO THREAT MODELING IN PRACTICE Thorsten Tarrach, Christoph Schmittner WHAT IS THREAT MODELING Introduction WHAT IS THREAT MODELING Structured Process Examination of a system for potential weaknesses


  1. AN INTRODUCTION TO THREAT MODELING IN PRACTICE Thorsten Tarrach, Christoph Schmittner

  2. WHAT IS THREAT MODELING Introduction

  3. WHAT IS THREAT MODELING • Structured Process • Examination of a system for potential weaknesses https://www.castlesworld.com/tools/motte-and-bailey-castles.php

  4. WHAT IS THREAT MODELING • • Structured Process Systematic approach • • Examination of a system for potential Based on a conceptual model of weaknesses weaknesses and threats https://www.castlesworld.com/tools/motte-and-bailey-castles.php https://deadliestwarrior.fandom.com/wiki/Huo_Chien

  5. WHAT IS THREAT MODELING • • Structured Process Systematic approach • • Examination of a system for potential Based on a conceptual model of weaknesses weaknesses and threats • Resolving identified weaknesses https://deadliestwarrior.fandom.com/wiki/Huo_Chien https://www.castlesworld.com/tools/concentric-castles.php

  6. WHAT IS THREAT MODELING • • Structured Process Systematic approach • • Examination of a system for potential Based on a conceptual model of weaknesses weaknesses and threats • • Resolving identified weaknesses Keeping the model of weaknesses and threats current https://www.castlesworld.com/tools/concentric-castles.php https://www.pbs.org/video/1812-niagara-frontier-fort-george-cannon-firing/

  7. THREAT MODEL STRIDE

  8. S TRIDE • Spoofing • Person or program successfully impersonate someone else https://www.amazon.com/Moustache-Sailor-Fancy-Costume-Outfit/dp/B07QXT3C26

  9. S T RIDE • Tampering • Modify something in a way which is not desired by the considered stakeholder https://www.pinterest.at/pin/477311260477998586/

  10. ST R IDE • Repudiation • Actions cannot be assigned to a person or program

  11. STR I DE • Information disclosure • Sensitive information becomes known to people who should not know it https://www.tarses.com/blog/%EF%BB%BFlandlords-do-not-have-x-ray-vision-like-superman/

  12. STRI D E • Denial of Service • Resource or service is made temporarily or indefinitely unavailable

  13. STRID E • Elevation of Privilege • Gain elevated privileges https://tvtropes.org/pmwiki/pmwiki.php/Main/TotemPoleTrench

  14. APPLY THIS TO IT – STANDARD WAY • We model the system as a dataflow S T R I D E diagram • Processes, data stores, external Process X X X X X X elements communicate with each other over dataflows Data flow X X X • And we define susceptibilities for the elements based on STRIDE External element X X Data store X X X 26/02/2020 14

  15. ISSUES • Works for a rough system draft • Less suited for systems modeled in more details • There is a connection, but no intended data flow • Also challenging if the threat model is more concrete • How to describe known issues or weaknesses • If there is no time stamp or version number in an update an attacker could cause a downgrade • Difficult for certification, missing traceability 26/02/2020 15

  16. AIT APPROACH FOR THREAT MODELING Developed for embedded systems and integrated in model-based engineering

  17. MODEL-BASED ENGINEERING Security Model • ThreatGet is integrated into Enterprise Architect • Extensive model library with security properties and common domain elements

  18. DOMAIN ELEMENTS Domain Elements • Set of common elements for a domain • Inheritance and Refinement • Customizable

  19. SECURITY PROPERTIES Security Properties • Relevant security properties • Assignable to elements • Customizable

  20. AUTOMATED SECURITY ASSESSMENT Rule Engine • Rules describe potential weaknesses • Custom made Grammar • Multi-hops attacks • Usage of multiple databases

  21. VERSIONING Traceability of Analysis • For each analysis a snapshot of the model is generated • Snapshot + analysis reports is marked with date and time • Stored in the model

  22. THREATGET – COOPERATIVE THREATMODELING EA Addin EA Addin Web-based Backend Modelling Modelling Knowledge Risk Risk Base Management Management EA Addin EA Addin Analysis Engine Modelling Modelling Risk Risk Management Management

  23. AUTOMATED THREAT INTELLIGENCE UPDATES Web-based Backend Threat Intelligence AIT CVE, Common AIT Review and STIX, Structured Threat Knowledge … Translation Vulnerabilities and Information eXpression Base Exposures User Knowledge Base

  24. THREAT INTELLIGENCE – AUTOMOTIVE EXAMPLE AIT Knowledge Base >1400 >100 Threats >300 Threats >400 Threats >400 Threats >200 Threats UNECE WP29 ETSI External sources AIT analysis ITU UNECE WP29: World Forum for Harmonization of Vehicle Regulations ETSI: European Telecommunications Standards Institute (V2X in Europe) 26/02/2020 24 ITU: International Telecommunication Union

  25. THREATGET Example 26/02/2020 25

  26. THREATGET Summary

  27. THREATGET - THREAT ANALYSIS AND RISK MANAGEMENT Domain knowledge Cybersecurity expertise Modeling knowhow Benefits • Automated threat ThreatGet analysis based on current threat intelligence • Traceability from threats to requirements • Continuous process, integrated with model- based engineering https://www.threatget.com/ Threat Analysis Report

  28. THANK YOU! Thorsten Tarrach, Christoph Schmittner

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend