an introduction to threat modeling in practice
play

AN INTRODUCTION TO THREAT MODELING IN PRACTICE Thorsten Tarrach, - PowerPoint PPT Presentation

AN INTRODUCTION TO THREAT MODELING IN PRACTICE Thorsten Tarrach, Christoph Schmittner WHAT IS THREAT MODELING Introduction WHAT IS THREAT MODELING Structured Process Examination of a system for potential weaknesses


  1. AN INTRODUCTION TO THREAT MODELING IN PRACTICE Thorsten Tarrach, Christoph Schmittner

  2. WHAT IS THREAT MODELING Introduction

  3. WHAT IS THREAT MODELING • Structured Process • Examination of a system for potential weaknesses https://www.castlesworld.com/tools/motte-and-bailey-castles.php

  4. WHAT IS THREAT MODELING • • Structured Process Systematic approach • • Examination of a system for potential Based on a conceptual model of weaknesses weaknesses and threats https://www.castlesworld.com/tools/motte-and-bailey-castles.php https://deadliestwarrior.fandom.com/wiki/Huo_Chien

  5. WHAT IS THREAT MODELING • • Structured Process Systematic approach • • Examination of a system for potential Based on a conceptual model of weaknesses weaknesses and threats • Resolving identified weaknesses https://deadliestwarrior.fandom.com/wiki/Huo_Chien https://www.castlesworld.com/tools/concentric-castles.php

  6. WHAT IS THREAT MODELING • • Structured Process Systematic approach • • Examination of a system for potential Based on a conceptual model of weaknesses weaknesses and threats • • Resolving identified weaknesses Keeping the model of weaknesses and threats current https://www.castlesworld.com/tools/concentric-castles.php https://www.pbs.org/video/1812-niagara-frontier-fort-george-cannon-firing/

  7. THREAT MODEL STRIDE

  8. S TRIDE • Spoofing • Person or program successfully impersonate someone else https://www.amazon.com/Moustache-Sailor-Fancy-Costume-Outfit/dp/B07QXT3C26

  9. S T RIDE • Tampering • Modify something in a way which is not desired by the considered stakeholder https://www.pinterest.at/pin/477311260477998586/

  10. ST R IDE • Repudiation • Actions cannot be assigned to a person or program

  11. STR I DE • Information disclosure • Sensitive information becomes known to people who should not know it https://www.tarses.com/blog/%EF%BB%BFlandlords-do-not-have-x-ray-vision-like-superman/

  12. STRI D E • Denial of Service • Resource or service is made temporarily or indefinitely unavailable

  13. STRID E • Elevation of Privilege • Gain elevated privileges https://tvtropes.org/pmwiki/pmwiki.php/Main/TotemPoleTrench

  14. APPLY THIS TO IT – STANDARD WAY • We model the system as a dataflow S T R I D E diagram • Processes, data stores, external Process X X X X X X elements communicate with each other over dataflows Data flow X X X • And we define susceptibilities for the elements based on STRIDE External element X X Data store X X X 26/02/2020 14

  15. ISSUES • Works for a rough system draft • Less suited for systems modeled in more details • There is a connection, but no intended data flow • Also challenging if the threat model is more concrete • How to describe known issues or weaknesses • If there is no time stamp or version number in an update an attacker could cause a downgrade • Difficult for certification, missing traceability 26/02/2020 15

  16. AIT APPROACH FOR THREAT MODELING Developed for embedded systems and integrated in model-based engineering

  17. MODEL-BASED ENGINEERING Security Model • ThreatGet is integrated into Enterprise Architect • Extensive model library with security properties and common domain elements

  18. DOMAIN ELEMENTS Domain Elements • Set of common elements for a domain • Inheritance and Refinement • Customizable

  19. SECURITY PROPERTIES Security Properties • Relevant security properties • Assignable to elements • Customizable

  20. AUTOMATED SECURITY ASSESSMENT Rule Engine • Rules describe potential weaknesses • Custom made Grammar • Multi-hops attacks • Usage of multiple databases

  21. VERSIONING Traceability of Analysis • For each analysis a snapshot of the model is generated • Snapshot + analysis reports is marked with date and time • Stored in the model

  22. THREATGET – COOPERATIVE THREATMODELING EA Addin EA Addin Web-based Backend Modelling Modelling Knowledge Risk Risk Base Management Management EA Addin EA Addin Analysis Engine Modelling Modelling Risk Risk Management Management

  23. AUTOMATED THREAT INTELLIGENCE UPDATES Web-based Backend Threat Intelligence AIT CVE, Common AIT Review and STIX, Structured Threat Knowledge … Translation Vulnerabilities and Information eXpression Base Exposures User Knowledge Base

  24. THREAT INTELLIGENCE – AUTOMOTIVE EXAMPLE AIT Knowledge Base >1400 >100 Threats >300 Threats >400 Threats >400 Threats >200 Threats UNECE WP29 ETSI External sources AIT analysis ITU UNECE WP29: World Forum for Harmonization of Vehicle Regulations ETSI: European Telecommunications Standards Institute (V2X in Europe) 26/02/2020 24 ITU: International Telecommunication Union

  25. THREATGET Example 26/02/2020 25

  26. THREATGET Summary

  27. THREATGET - THREAT ANALYSIS AND RISK MANAGEMENT Domain knowledge Cybersecurity expertise Modeling knowhow Benefits • Automated threat ThreatGet analysis based on current threat intelligence • Traceability from threats to requirements • Continuous process, integrated with model- based engineering https://www.threatget.com/ Threat Analysis Report

  28. THANK YOU! Thorsten Tarrach, Christoph Schmittner

Recommend


More recommend