threat modeling
threat modeling
1. DEFINE OBJECTIVES
2. TECHNICAL SCOPE
3. APPLICATION DECOMPOSITION
4. THREAT ANALYSIS
5. VULNERABILITY AND WEAKNESS ANALYSIS
6. ATTACK MODELING
7. RISK AND IMPACT ANALYSIS
A practical example of threat modeling for an organization that operates an online banking
application. This will illustrate how to map the steps of threat modeling into a real-world
scenario.
External Interfaces:
o Login page (username/password input).
o APIs (used by the mobile app).
o Public-facing web servers.
Internal Interfaces:
o Communication between application servers and the database.
o Admin panels used by internal staff.
6. Assess Vulnerabilities
1. Credential Interception:
o Implement HTTPS with strong encryption (TLS 1.3).
o Use HSTS to enforce HTTPS connections.
2. SQL Injection:
o Use prepared statements to sanitize database queries.
o Perform regular code reviews.
3. Denial of Service:
o Implement rate-limiting on login endpoints.
o Use a Web Application Firewall (WAF).
9. Review and Validate the Model
Stakeholder Review:
o Share the threat model with the IT security team, developers, and business
owners.
Penetration Testing: Validate mitigations by simulating attacks (e.g., SQL injection
tests).
Add New Features: E.g., if a chatbot is added, re-evaluate potential risks (e.g., data leaks
via chatbot responses).
Monitor New Threats: Keep up-to-date with emerging attack vectors (e.g., API abuse).
1. Objectives
To identify and mitigate potential security threats to the company's web application, customer
data, and network infrastructure.
2. System Components
Full system
Elevation of Privilege Exploitation of an API vulnerability to gain admin access.
compromise
6. Mitigation Strategies
Threat Mitigation
Elevation of Privilege Regularly test APIs for vulnerabilities using security tools.
7. Validation
Conduct penetration tests targeting high-risk areas, such as the web portal and APIs.
Perform periodic vulnerability scans using tools like Nessus or OpenVAS.
Test disaster recovery by simulating DDoS attacks and ensuring failover systems activate.
8. Reporting