An Example of use the Threat Modeling Tool

Similar documents
Using and Customizing Microsoft Threat Modeling Tool 2016

Practical Threat Modeling. SecAppDev 2018

Application Security Design Principles. What do you need to know?

Threat Modeling OWASP. The OWASP Foundation Martin Knobloch OWASP NL Chapter Board

THREAT MODELING IN SOCIAL NETWORKS. Molulaqhooa Maoyi Rotondwa Ratshidaho Sanele Macanda

Development*Process*for*Secure* So2ware

Threat Modeling for System Builders and System Breakers!! Dan Copyright 2014 Denim Group - All Rights Reserved

Threat analysis. Tuomas Aura CS-C3130 Information security. Aalto University, autumn 2017

Threat Modeling For Secure Software Design

Whiteboard Hacking / Hands-on Threat Modeling. Introduction

SANS Institute , Author retains full rights.

Unit Level Secure by Design Approach

OWASP March 19, The OWASP Foundation Secure By Design

Threat Modeling. Bart De Win Secure Application Development Course, Credits to

DEFINITIONS AND REFERENCES

Software Architectural Risk Analysis (SARA): SSAI Roadmap

*NSTAC Report to the President on the Internet of Things.

German OWASP Day 2016 CarIT Security: Facing Information Security Threats. Tobias Millauer

IANS Pragmatic Threat Modeling. Michael Pinch, IANS Faculty

How to construct a sustainable vulnerability management program

Securing Cloud Computing

Instructions 1 Elevation of Privilege Instructions

How To Make Threat Modeling Work For You

Threat Modeling Using STRIDE

How Threat Modeling Can Improve Your IAM Solution

Software Architectural Risk Analysis (SARA) Frédéric Painchaud Robustness and Software Analysis Group

C1: Define Security Requirements

Students should have an understanding and a working knowledge in the following topics, or attend these courses as a pre-requisite:

RiskSense Attack Surface Validation for IoT Systems

Instructions 1. Elevation of Privilege Instructions. Draw a diagram of the system you want to threat model before you deal the cards.

Managed Security Services - Automated Analysis, Threat Analyst Monitoring and Notification

Secure Application Development. OWASP September 28, The OWASP Foundation

Towards Trustworthy Internet of Things for Mission-Critical Applications. Arjmand Samuel, Ph.D. Microsoft Azure - Internet of Things

Secure Development Lifecycle

mdns/dnssd Threat Model

CYSE 411/AIT 681 Secure Software Engineering. Topic #6. Seven Software Security Touchpoints (III) Instructor: Dr. Kun Sun

4. Risk-Based Security Testing. Reading. CYSE 411/AIT 681 Secure Software Engineering. Seven Touchpoints. Application of Touchpoints

Designing and Operating a Secure Active Directory.

GUI based and very easy to use, no security expertise required. Reporting in both HTML and RTF formats - Click here to view the sample report.

Common Threats and Effective Resolutions For Web Applications

Authentication Security

Dr. Stephanie Carter CISM, CISSP, CISA

Bank Infrastructure - Video - 1

Ethics and Information Security. 10 주차 - 경영정보론 Spring 2014

Copyright

Monthly Security Bulletin Briefing

Finding and Exploiting Access Control Vulnerabilities in Graphical User Interfaces

Certified Ethical Hacker (CEH)

Top 10 Database Security Threats and How to Stop Them. Rob Rachwald Director of Security Strategy

The Second Most Secure Database ISACA North Texas. Dan Cornell May 11 th, 2006

Cryptography and Network Security Chapter 1

Compliance Brief: The National Institute of Standards and Technology (NIST) , for Federal Organizations

Safety & Cybersecurity of embedded softwares in product and process

Certified Secure Web Application Engineer

VULNERABILITIES IN 2017 CODE ANALYSIS WEB APPLICATION AUTOMATED

Security Governance and Management Scorecard

Q WEB APPLICATION ATTACK STATISTICS

Test Harness for Web Application Attacks

Software Security Initiatives for Information Security Officers Marco Morana OWASP Cincinnati Chapter OWASP ISSA Cincinnati Chapter Meeting

Concurrent Distributed Authentication Model (CDAM)

7 Ways to Scale Web Security

ISO/IEC Common Criteria. Threat Categories

Creating an Adobe Connect Presentation: Using Your Personal Computer to Record and Publish

Security Testing White Paper

90% 191 Security Best Practices. Blades. 52 Regulatory Requirements. Compliance Report PCI DSS 2.0. related to this regulation

Monthly Security Bulletin Briefing

Guidelines for Writing Trusted Facility Manuals

The STRIDE towards IPv6: A Threat Model for IPv6 Transition Technologies

OWASP TOP Release. Andy Willingham June 12, 2018 OWASP Cincinnati

How the Privileged User Stole Christmas

Specialized Security Services, Inc. REDUCE RISK WITH CONFIDENCE. s3security.com

CERT Secure Coding Initiative. Define security requirements. Model Threats 11/30/2010

Intrusion prevention systems are an important part of protecting any organisation from constantly developing threats.

Security Testing. - a requirement for a secure business. ISACA DAY in SOFIA. Gabriel Mihai Tanase, Director, Cyber Services KPMG in CEE

RiskSense Attack Surface Validation for Web Applications

Analyzing Security Architectures

Students should have an understanding and a working knowledge in the following topics, or attend these courses as a pre-requisite:

Terms, Methodology, Preparation, Obstacles, and Pitfalls. Vulnerability Assessment Course

ISACA Silicon Valley. APIs The Next Hacker Target or a Business and Security Opportunity? Tim Mather, CISO Cadence Design Systems

Cryptography and Network Security

International Journal of Research (IJR) Vol-1, Issue-10 November 2014 ISSN Network Security

Threat Model of a Scenario Based on Trusted Platform Module 2.0 Specification

NIST Revision 2: Guide to Industrial Control Systems (ICS) Security

Question No: 1 After running a packet analyzer on the network, a security analyst has noticed the following output:

A STRIDE-Based Threat Model for Telehealth Systems

Cyber Security Program

Introduction Challenges with using ML Guidelines for using ML Conclusions

Investigative Response Case Metrics Initiative Preliminary findings from 700+ data compromise investigations

Fourteenforty Research Institute, Inc.

COMPUTER NETWORK SECURITY

Managed Application Security trends and best practices in application security

Reduce the Breach Detection Gap to Minutes. What is Forensic State Analysis (FSA)?

Finding and Exploiting Access Control Vulnerabilities in Graphical User Interfaces

UEFI and the Security Development Lifecycle

Privileged Account Security: A Balanced Approach to Securing Unix Environments

AIM Enterprise Platform Software IBM z/transaction Processing Facility Enterprise Edition 1.1.0

Vulnerabilities in online banking applications

EXAMINATION [The sum of points equals to 100]

Ethical Hacking and Countermeasures: Web Applications, Second Edition. Chapter 3 Web Application Vulnerabilities

Outline. 1 Introduction. 2 Security Architecture and Design. 3 Threat Risk Modelling. 4 Phishing. 5 Web Services. 6 Secure Coding Guidelines

Transcription:

1 Monthly Research 2016.11 An Example of use the Threat Modeling Tool E-Mail: research-feedback[at]ffri.jp Twitter: @FFRI_Research FFRI, Inc. http://www.ffri.jp/en/

Agenda About threat analysis support tool Examples of tools Analysis target system Analysis result How to read result Overview of threats Effective usage About template Additional definition of threat information Conclusions References 2

About threat analysis support tool There are various analysis support tools. DFD drawing, automated threat identification Benefits of tools Reduce analysis time by automatically identifying threats and generating a report Possibility to discover potential threats you could not find Reducing dependency on individual skills The same analysis result can be obtained for the same input data. 3

Examples of tools Microsoft Threat Modeling Tool DFD creation, tool to derive threats automatically from DFD TRIKE DFD creation, drawing tool including security requirements SeaMonster Attack tree and misuse case drawing tool A misuse case is an unintended operation. SecurITree Attack tree creation tool In this report, we explain an example of use the Microsoft Threat Modeling Tool 2016. 4

Analysis target system The target is a general network camera system. The figure below is a DFD created using the tool. Add elements and data flow of the system to design view. 5

Analysis result - How to read result The analysis result can be confirmed on the analysis view. A threat list contains properties and outline of threats. It is necessary to check whether the found threats actually. Example: The web server could be a subject to a cross-site scripting attack because it does not sanitize untrusted input.» The above threat does not exist on a page without input form. It is possible to describe priority and countermeasure for each threat. The priority is setting to 'high' by default, user should change it. It is useful for sharing status with multiple analysts. 6

Analysis result - Overview of threats 47 threats were pointed out in the system. Spoofing 10 cases Tampering 8 cases Repudiation 4 cases Information Disclosure 3 cases Denial of Service 12 cases Elevation of privilege 10 cases Many threats are related to web server. Many categories of threats have been found there. The descriptions of the threat are general. If a threat information is insufficient, user should add information. 7

Effective usage - About template What you can do by adding templates. You can apply any picture to elements to make nicelooking DFD. You can add threat information defined yourself. The following figure shows an entry screen when creating a template. 8

Effective usage - Additional definition of threat information Analysis efficiency will be improved by templates. More extended analysis becomes possible by adding templates of threat information. Template example Title: Unauthorized access with default password. Include: target is [Web Service] Description: If you do not change the default password, attackers may compromise the system. 9

Conclusions Pros It can be used easily because threats will be listed automatically from a DFD. It helps secure system design. You can share threats information and priority with your team. Cons Threats that do not exist may be false detected. You should confirm the feasibility of analyzed threats. 10

References Threat Modeling http://threatmodelingbook.com/index.html SDL Threat Modeling Tool https://www.microsoft.com/enus/download/details.aspx?id=49168 Microsofts New Threat Modeling Tool https://blog.secodis.com/2016/07/06/microsofts-new-threatmodeling-tool/ TRIKE http://octotrike.org/ SeaMonster https://sourceforge.net/projects/seamonster/?source=navbar SecuriTree http://www.amenaza.com/ 11