22
Presented by Mike Sues, Ethical Hack Specialist Threat Modeling

Presented by Mike Sues, Ethical Hack Specialist Threat Modeling

Embed Size (px)

DESCRIPTION

3 Talk Outline  Threat modeling  SDLC  Attack trees Threat Modelling

Citation preview

Page 1: Presented by Mike Sues, Ethical Hack Specialist Threat Modeling

Presented byMike Sues, Ethical Hack Specialist

Threat Modeling

Page 2: Presented by Mike Sues, Ethical Hack Specialist Threat Modeling

2Threat Modelling

Objectives To understand

The basics of threat modeling Where threat modeling fits in the SDLC Use and construction of attack trees

Page 3: Presented by Mike Sues, Ethical Hack Specialist Threat Modeling

3

Talk Outline Threat modeling SDLC Attack trees

Threat Modelling

Page 4: Presented by Mike Sues, Ethical Hack Specialist Threat Modeling

4

Motivation Threat Risk Assessment

Understand threats and risks Manage costs of mitigation Minimize the attack surface

Sales Increased security/privacy concerns C & A

Threat Modelling

Page 5: Presented by Mike Sues, Ethical Hack Specialist Threat Modeling

5

Historically Lack of understanding of threats Security was an add-on

Band-aid solutions Use of security buzzwords/technology

Threat Modelling

Page 6: Presented by Mike Sues, Ethical Hack Specialist Threat Modeling

6

Threat Modeling Threat Risk Assessment Apply appropriate controls Attack Trees

Threat Modelling

Page 7: Presented by Mike Sues, Ethical Hack Specialist Threat Modeling

7

Goals Identify,

assets protected by the application threats to the assets

Develop, Mitigation strategies

Threat Modelling

Page 8: Presented by Mike Sues, Ethical Hack Specialist Threat Modeling

8

Assets Data

Application Configuration Database records

Threat Modelling

Page 9: Presented by Mike Sues, Ethical Hack Specialist Threat Modeling

9

Assets Examples

Application Code Configuration

User authentication credentials Business data

User data records Audit trails

Threat Modelling

Page 10: Presented by Mike Sues, Ethical Hack Specialist Threat Modeling

10

Assets Value

Classification Monetary value

Replacement cost Intangible

Reputation

Threat Modelling

Page 11: Presented by Mike Sues, Ethical Hack Specialist Threat Modeling

11

Threats Model application and data flows

High-level architectural diagram of application Model threats to assets

Multiple vectors Consider,

Asset Severity Likelihood Costs

Threat Modelling

Page 12: Presented by Mike Sues, Ethical Hack Specialist Threat Modeling

12

Threats Taxonomy

S.T.R.I.D.E Spoofing Tampering Repudiation Information disclosure Denial of service Elevation of privilege

Threat Modelling

Page 13: Presented by Mike Sues, Ethical Hack Specialist Threat Modeling

13

Threats Spoofing

Replay requests to a database server to gain unauthorized access to data

Tampering Defacement of a web site

Repudiation Deleting or modifying audit trail records

Information disclosure Gaining unauthorized access to data

Threat Modelling

Page 14: Presented by Mike Sues, Ethical Hack Specialist Threat Modeling

14

Threats Denial of service

Crashing or flooding a service Elevation of privilege

Hijacking another user’s session with the application to gain access to the user’s data

Threat Modelling

Page 15: Presented by Mike Sues, Ethical Hack Specialist Threat Modeling

15

Threats Attack trees

Graphically model attack goals & vectors Root of tree is the overall goal

e.g. Steal passwords Children are sub-goals

One step or multiple steps e.g. Collect plaintext passwords or shoulder surf e.g. Collect password hashes and crack hashes e.g. Gain privileged access and install keystroke

collector and exfiltrate password

Threat Modelling

Page 16: Presented by Mike Sues, Ethical Hack Specialist Threat Modeling

16

Attack Trees

Threat Modelling

Steal passwords

Shoulder surf Collect sessions

Parse plaintextpassword

Parsepassword hash

Crackpassword hash

Gainremote access

Installkeystroke logger

Exfiltratepasswords

Page 17: Presented by Mike Sues, Ethical Hack Specialist Threat Modeling

17

Attack Trees Node attributes

Cost Availability of tools etc

Threat evaluation Risk

Threat Modelling

Page 18: Presented by Mike Sues, Ethical Hack Specialist Threat Modeling

18

Mitigation Rank threats

Prioritize Develop a strategy,

Ignore the risk Accept the risk Delegate the risk Fix the problem

Threat Modelling

Page 19: Presented by Mike Sues, Ethical Hack Specialist Threat Modeling

19

Exercise HackMe Travel Identify assets Identify threats

STRIDE Build one attack tree

Threat Modelling

Page 20: Presented by Mike Sues, Ethical Hack Specialist Threat Modeling

20

Conclusion Threat modeling,

Understanding the threat environment Manage costs of mitigation Guide to the application secure design

principles

Minimize an application’s attack surface

Threat Modelling

Page 21: Presented by Mike Sues, Ethical Hack Specialist Threat Modeling

21

Conclusion Questions?

Threat Modelling

Page 22: Presented by Mike Sues, Ethical Hack Specialist Threat Modeling

22

w w w. r i g e l k s e c u r i t y. c o m

Presented by Mike Sues,Ethical Hack Specialistm s u e s @ r i g e l k s e c u r i t y . c o m

Marie Pilon, Director of Operations t r a i n i n g @ r i g e l k s e c u r i t y . c o m

Rigel Kent Training - 180 Preston St. 3Rd Floor – Ottawa, On

1(613)233-HACK 1-877-777-H8CK