PROTECTION POKER
- A GAME FOR RISK
ESTIMATION
( Yaw-toon)
@seniorfrosk
Martin Gilje Jaatun
Based on the original game by Laurie Williams, NCSU
PROTECTION POKER - A GAME FOR RISK ESTIMATION Martin Gilje Jaatun - - PowerPoint PPT Presentation
PROTECTION POKER - A GAME FOR RISK ESTIMATION Martin Gilje Jaatun ( Yaw-toon) @seniorfrosk Based on the original game by Laurie Williams, NCSU Efficient and effective software security = risk based software security Impossible to
@seniorfrosk
Based on the original game by Laurie Williams, NCSU
@seniorfrosk @seniorfrosk
2
@seniorfrosk @seniorfrosk
3
@seniorfrosk @seniorfrosk
risk = (the total value of all assets that could be exploited with a successful attack) × (the exposure)
4
Exposure
Hard to exploit Easy to exploit Asset High value High priority Low value Low priority
@seniorfrosk
5
Task/process Entity/user Data flows Data store Boundary Complex/decomposable
@seniorfrosk @seniorfrosk
6
Web Servlet
Users
Login Process
Web pages Database files
College Library Database
Data Data
Authenticate User SQL Query Authenticate User SQL Query Result Authenticate User Authenticate User Result Pages Web Server / Database Boundary User / Web Server Boundary Login Request Login Response
Case and data flow diagram inspired by https://www.owasp.org/index.php/Application_Threat_Modeling
@seniorfrosk @seniorfrosk
7
@seniorfrosk @seniorfrosk
8
@seniorfrosk @seniorfrosk
9
@seniorfrosk
10
Asset: Credentials
@seniorfrosk
11
Authentication credentials are pretty much the most important thing we have? A password gone walkabout is hardly a crisis, there are
that can prevent misuse Asset: Credentials
@seniorfrosk
12
Asset: Credentials
@seniorfrosk
13
Asset: Credentials
@seniorfrosk
14
@seniorfrosk
15
Exposure "Order book"
@seniorfrosk
16
It's a functionality available from the internet, even though access is restricted All you can do is request a book, what could possibly go wrong? Exposure "Order book"
@seniorfrosk
17
Exposure "Order book"
@seniorfrosk
18
Exposure "Order book"
@seniorfrosk
19
# Asset Value 1 Authentication credentials 80 2 Personal data 100 3 Webpages 50 4 Login session 80 5 Audit data 90 6 SQL queries 10 SUM 410
@seniorfrosk
20
# Requirement/feature Exposure ∑ value assets Risk Rank 1 Order book 50 410 20500 1 2 … 3 … 4 Coffe break warning 10 10 100 5 5 Add Admin user 100 150 15000 2
@seniorfrosk @seniorfrosk
21
@seniorfrosk
22
Coffee break alert Add admin user Personal Data General library info
@seniorfrosk @seniorfrosk
23
@seniorfrosk @seniorfrosk
24