Threat modelling for developers Arne Padmos xkcd Safety vs - - PowerPoint PPT Presentation

threat modelling for developers
SMART_READER_LITE
LIVE PREVIEW

Threat modelling for developers Arne Padmos xkcd Safety vs - - PowerPoint PPT Presentation

Threat modelling for developers Arne Padmos xkcd Safety vs Security William Warby Warner Bros Are we doomed? Building security in Security by design Shifting security left Microsoft Microsoft If we ... could do


slide-1
SLIDE 1

Threat modelling for developers

Arne Padmos

slide-2
SLIDE 2

xkcd

slide-3
SLIDE 3

Safety vs Security

slide-4
SLIDE 4
slide-5
SLIDE 5

William Warby Warner Bros

slide-6
SLIDE 6
slide-7
SLIDE 7

Are we doomed?

slide-8
SLIDE 8
slide-9
SLIDE 9

“ Building security in ” “ Security by design ” “ Shifting security left ”

slide-10
SLIDE 10

Microsoft

slide-11
SLIDE 11

Microsoft

slide-12
SLIDE 12

“ If we ... could do only one thing “ to improve software security … “ we would do threat modelling “ every day of the week. ” — Howard & Lipner

slide-13
SLIDE 13

“ If we ... could do only one thing “ to improve software security … “ we would do threat modelling “ every day of the week. ” — Howard & Lipner

slide-14
SLIDE 14

Requirements engineering & Architectural analysis

slide-15
SLIDE 15

What’s your threat model? ( security assumptions )

slide-16
SLIDE 16
slide-17
SLIDE 17

“ More precisely, we will assume “ the following about a saboteur: ” – obtain any message – initiate any conversation – be a receiver to any user

slide-18
SLIDE 18

Utagawa Kuniyoshi

slide-19
SLIDE 19

NSA

slide-20
SLIDE 20

Eleanor Saitta

slide-21
SLIDE 21

What could possibly go wrong? & how

slide-22
SLIDE 22

What could possibly go wrong? & how

slide-23
SLIDE 23

Types of threat modelling – Attacker-centric – Asset-centric – System-centric

slide-24
SLIDE 24

William Warby

slide-25
SLIDE 25

Paul Pols

slide-26
SLIDE 26

Cyril Davenport

slide-27
SLIDE 27

Eleanor Saitta et al.

slide-28
SLIDE 28

Stewart Brand

slide-29
SLIDE 29

Antti Vähä-Sipilä

slide-30
SLIDE 30

Popular approaches ( system-centric ) – STRIDE – Trike – PASTA

slide-31
SLIDE 31

Relevant questions

  • 1. What are we working on?
  • 2. What can go wrong?
  • 3. What are we going to do?
  • 4. Did we do a good job?

Adam Shostack

slide-32
SLIDE 32

Lightweight methodology

  • 1. Draw data flows
  • 2. Elicit threats
  • 3. Ranking + controls
  • 4. Check your work
slide-33
SLIDE 33

Lightweight methodology

  • 1. Draw data flows
  • 2. Elicit threats
  • 3. Ranking + controls
  • 4. Check your work
slide-34
SLIDE 34

CMU

slide-35
SLIDE 35

Adam Shostack

slide-36
SLIDE 36

Mark Dowd et al.

slide-37
SLIDE 37

Trail of Bits

slide-38
SLIDE 38

Lightweight methodology

  • 1. Draw data flows
  • 2. Elicit threats
  • 3. Ranking + controls
  • 4. Check your work
slide-39
SLIDE 39

Confidentiality Integrity Availability Authentication Authorisation Accountability

slide-40
SLIDE 40

Information disclosure Tampering Denial of service Spoofing Elevation of privilege Repudiation

slide-41
SLIDE 41

“STRIDE”

slide-42
SLIDE 42

SAFEcode

slide-43
SLIDE 43

SWIFT

slide-44
SLIDE 44

Adam Shostack

slide-45
SLIDE 45

Lightweight methodology

  • 1. Draw data flows
  • 2. Elicit threats
  • 3. Ranking + controls
  • 4. Check your work
slide-46
SLIDE 46

Dick Bruna

slide-47
SLIDE 47

Parker Brothers

slide-48
SLIDE 48

Risk ≈ likelihood × impact

slide-49
SLIDE 49

ThoughtWorks

slide-50
SLIDE 50

Howard & Lipner

slide-51
SLIDE 51

Lightweight methodology

  • 1. Draw data flows
  • 2. Elicit threats
  • 3. Ranking + controls
  • 4. Check your work
slide-52
SLIDE 52

“ All models are wrong, “ some models are useful. ” — George Box

slide-53
SLIDE 53

Koyaanisqatsi

slide-54
SLIDE 54

Stephen Checkoway et al.

slide-55
SLIDE 55
slide-56
SLIDE 56

Howard & Lipner

slide-57
SLIDE 57

xkcd

slide-58
SLIDE 58

Lightweight methodology

  • 1. Draw data flows
  • 2. Elicit threats
  • 3. Ranking + controls
  • 4. Check your work
slide-59
SLIDE 59
slide-60
SLIDE 60

Dick Bruna

slide-61
SLIDE 61

ThoughtWorks

slide-62
SLIDE 62

ThoughtWorks

slide-63
SLIDE 63

ThoughtWorks

slide-64
SLIDE 64

ThoughtWorks

slide-65
SLIDE 65
slide-66
SLIDE 66
slide-67
SLIDE 67

@wilg

slide-68
SLIDE 68

Rijksoverheid

slide-69
SLIDE 69

What could possibly go wrong? & how

slide-70
SLIDE 70

Arne Padmos hello@arnepadmos.com

slide-71
SLIDE 71
slide-72
SLIDE 72

github.com /arnepadmos/resources my “toy collection”