SlideShare a Scribd company logo
Umut IŞIK
Threat Modelling
With a sample application
1. Threat Modelling
2. Sample Application
3. Threat Model Of The Application
4. Resources
Table Of Contents
An approach for analyzing the security of an application
Security?
▪ protect applications from external threats
▪ protect data integrity
▪ protect service
1.Threat Modelling
Vocabulary
▪ Asset; A resource of value such as the data in a database
▪ Threat; Anything that can exploit a vulnerability and obtain, damage,
or destroy an asset.
▪ Vulnerability; A weakness or gap in security program that can be
exploited by threats to gain unauthorized access to an asset.
▪ Attack (or exploit); An action taken to harm an asset.
▪ Countermeasure; A safeguard that addresses a threat and
mitigates risk.
1.Threat Modelling
The model can be decomposed into three steps
1. Decompose the application
2. Determine and rank threats
3. Determine countermeasures and migitation
1.Threat Modelling
1.1. Decompose the application
Understanding of the application
▪ External Dependencies
▪ Entry points: sources of input to your application
▪ Assets
▪ Roles: sets of priviledges, trust levels
1.Threat Modelling
1.2. Determine and rank threats
Categorization of threats (by attackers goal)
▪ Spoofing: Illegal access
▪ Tampering: Maliciously add/modify persistent data
▪ Repudiation:
▪ Information Disclosure: Read data that was not granted
▪ Denial of Service: Make service unavailable
▪ Elevation of Privilege: Gain privileged access
1.Threat Modelling
1.2. Determine and rank threats
Threats should be ranked according to risk (1-10)
(D + R + E + A + D)/5
▪ Damage;
▪ Reproducibility;
▪ Exploitability;
▪ Affected Users;
▪ Discoverability;
1.Threat Modelling
1.2. Determine and rank threats
What is risk?
Risk = Likelihood X Impact
1.Threat Modelling
1.2. Determine and rank threats
Likelihood is probability and possibility of the attack.
1. Can an attacker exploit the attack remotely?
2. Is the authentication required?
3. Can it be automated?
1.Threat Modelling
1.2. Determine and rank threats
Impact is the potential damage and the extent of the damage.
Can the attacker
1. take over the system complety?
2. gain administration access to the system?
3. crash the system?
4. access to sensitive information?
1.Threat Modelling
1.2. Determine and rank threats
Impact is the potential damage and the extent of the damage.
1. How many data sources and components can be impacted?
2. How deep can the threat agent go?
1.Threat Modelling
1.3. Determine countermeasures and mitigation
Security Controls
1.Threat Modelling
Type Security Control
Spoofing Authentication, protect secrets, don’t store secrets
Tampering Integrity, hash, digital signature, tamper resistant
protocols
Repudiation Non-Repudiation, digital signature
Information Disclosure Confidentiality, privacy enhanced
protocols,encryption,protect secrets,don’t store
secrets
Denial of Service Authentication, authorization, filtering, throttling,
quality of service
Elevation of privilege Authorization, least priviledge
1.3. Determine countermeasures and mitigation
Mitigation Strategy
1. Do nothing
2. Inform about the risk
3. Mitigate the risk
4. Accept the risk
5. Transfer the risk
6. Terminate the risk
1.Threat Modelling
Content Translation Memory (TM)
▪ Memory between internal CMSs to external translation agencies
▪ UI for users to update memory
▪ Service layer for CMS aplications to send and receive data
▪ FTP file transfer to translation agency
2. Sample Application
TM
2. Sample Application
3.1. Decomposing the Application
External Dependencies
3. Threat Model Of The Application
ID Description Protection Migitation Strategy
1 The application will run
on a Linux server running
Apache.
The server will be
hardenned by creating a
lates version strategy
Transfer the risk
2 The database server will
be Mysql
The server will be
hardenned by creating a
lates version strategy
Transfer the risk
3 The connection between
application and the
database
Over a private network Terminate the risks
3.1. Decomposing the Application
Entry Points
3. Threat Model Of The Application
ID Name Description Trust Level/Role Migitation Strategy
1 User Interface:
• Login Page
• Edit Translation
• Edit Transaction
• Reports
All Pages should
be accessible via
TLS
Anonymous User, User
with valid credentials
Migitate the risk
2 Service Layer All services
should be
accessible via TLS
Service User with valid
API key
Migitate the risk
3 FTP connection Connect to an
external FTP
server via TLS
User with valid
credentials
Migitate the risk
3.1. Decomposing the Application
Assets
3. Threat Model Of The Application
ID Name Description Trust Level/Role
1 Content Content data User with valid credentials, Service
User with valid API key
2 User data usernames, passwords User with valid credentials
3 Transaction
information
Locale assignment,
translation status
User with valid credentials
3.2. Threat Profile
▪ Brainstorm about threats
▪ Avoid thinking about solutions
▪ Give proper unique for each threat
3. Threat Model Of The Application
3.2. Threat Profile
Threat #1 Atacker steals authentication credentials
Rank: 8
▪ Credentials are cached to insecure locations on the client system
▪ Credentials are sent as GET parameters that may be cached.
3. Threat Model Of The Application
3.2. Threat Profile
Threat #2 Atacker logins with brute force
Rank: 8
▪ The Logon page does not properly sanitize input
▪ Functionality accessible only after logging in can be called directly
▪ Credentials are cached locally.
▪ Credentials are present in the form of comments in JavaScript.
▪ Authentication is handled on the client (JavaScript).
▪ Persistent cookies are stored in the browser.
▪ Weak passwords are in use.
3. Threat Model Of The Application
3.2. Threat Profile
Threat #3 An attacker can launch a denial of service attack
Rank: 9
▪ Poorly configured account lockout policy in place.
▪ Absence of CAPTCHA allowing users to fill up a backend database
with useless data via public registration forms.
3. Threat Model Of The Application
▪ https://www.owasp.org/index.php/Application_Threat_Modeling
5. Resources
Ad

More Related Content

What's hot (20)

Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...
Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...
Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...
Edureka!
 
Threat hunting 101 by Sandeep Singh
Threat hunting 101 by Sandeep SinghThreat hunting 101 by Sandeep Singh
Threat hunting 101 by Sandeep Singh
OWASP Delhi
 
Cybersecurity 1. intro to cybersecurity
Cybersecurity 1. intro to cybersecurityCybersecurity 1. intro to cybersecurity
Cybersecurity 1. intro to cybersecurity
sommerville-videos
 
Cyber Threat Intelligence
Cyber Threat IntelligenceCyber Threat Intelligence
Cyber Threat Intelligence
mohamed nasri
 
Real World Application Threat Modelling By Example
Real World Application Threat Modelling By ExampleReal World Application Threat Modelling By Example
Real World Application Threat Modelling By Example
NCC Group
 
Secure coding presentation Oct 3 2020
Secure coding presentation Oct 3 2020Secure coding presentation Oct 3 2020
Secure coding presentation Oct 3 2020
Moataz Kamel
 
Cyber Threat Modeling
Cyber Threat ModelingCyber Threat Modeling
Cyber Threat Modeling
EC-Council
 
Application Security Architecture and Threat Modelling
Application Security Architecture and Threat ModellingApplication Security Architecture and Threat Modelling
Application Security Architecture and Threat Modelling
Priyanka Aash
 
Application Security - Your Success Depends on it
Application Security - Your Success Depends on itApplication Security - Your Success Depends on it
Application Security - Your Success Depends on it
WSO2
 
Threat Hunting
Threat HuntingThreat Hunting
Threat Hunting
Splunk
 
Application Security
Application SecurityApplication Security
Application Security
Reggie Niccolo Santos
 
Penetration testing reporting and methodology
Penetration testing reporting and methodologyPenetration testing reporting and methodology
Penetration testing reporting and methodology
Rashad Aliyev
 
MITRE ATT&CK framework
MITRE ATT&CK frameworkMITRE ATT&CK framework
MITRE ATT&CK framework
Bhushan Gurav
 
7 Steps to Threat Modeling
7 Steps to Threat Modeling7 Steps to Threat Modeling
7 Steps to Threat Modeling
Danny Wong
 
The Current ICS Threat Landscape
The Current ICS Threat LandscapeThe Current ICS Threat Landscape
The Current ICS Threat Landscape
Dragos, Inc.
 
Threat Modeling to Reduce Software Security Risk
Threat Modeling to Reduce Software Security RiskThreat Modeling to Reduce Software Security Risk
Threat Modeling to Reduce Software Security Risk
Security Innovation
 
What is Penetration Testing?
What is Penetration Testing?What is Penetration Testing?
What is Penetration Testing?
btpsec
 
VAPT - Vulnerability Assessment & Penetration Testing
VAPT - Vulnerability Assessment & Penetration Testing VAPT - Vulnerability Assessment & Penetration Testing
VAPT - Vulnerability Assessment & Penetration Testing
Netpluz Asia Pte Ltd
 
Cyber Threat Intelligence
Cyber Threat IntelligenceCyber Threat Intelligence
Cyber Threat Intelligence
seadeloitte
 
VAPT PRESENTATION full.pptx
VAPT PRESENTATION full.pptxVAPT PRESENTATION full.pptx
VAPT PRESENTATION full.pptx
DARSHANBHAVSAR14
 
Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...
Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...
Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...
Edureka!
 
Threat hunting 101 by Sandeep Singh
Threat hunting 101 by Sandeep SinghThreat hunting 101 by Sandeep Singh
Threat hunting 101 by Sandeep Singh
OWASP Delhi
 
Cybersecurity 1. intro to cybersecurity
Cybersecurity 1. intro to cybersecurityCybersecurity 1. intro to cybersecurity
Cybersecurity 1. intro to cybersecurity
sommerville-videos
 
Cyber Threat Intelligence
Cyber Threat IntelligenceCyber Threat Intelligence
Cyber Threat Intelligence
mohamed nasri
 
Real World Application Threat Modelling By Example
Real World Application Threat Modelling By ExampleReal World Application Threat Modelling By Example
Real World Application Threat Modelling By Example
NCC Group
 
Secure coding presentation Oct 3 2020
Secure coding presentation Oct 3 2020Secure coding presentation Oct 3 2020
Secure coding presentation Oct 3 2020
Moataz Kamel
 
Cyber Threat Modeling
Cyber Threat ModelingCyber Threat Modeling
Cyber Threat Modeling
EC-Council
 
Application Security Architecture and Threat Modelling
Application Security Architecture and Threat ModellingApplication Security Architecture and Threat Modelling
Application Security Architecture and Threat Modelling
Priyanka Aash
 
Application Security - Your Success Depends on it
Application Security - Your Success Depends on itApplication Security - Your Success Depends on it
Application Security - Your Success Depends on it
WSO2
 
Threat Hunting
Threat HuntingThreat Hunting
Threat Hunting
Splunk
 
Penetration testing reporting and methodology
Penetration testing reporting and methodologyPenetration testing reporting and methodology
Penetration testing reporting and methodology
Rashad Aliyev
 
MITRE ATT&CK framework
MITRE ATT&CK frameworkMITRE ATT&CK framework
MITRE ATT&CK framework
Bhushan Gurav
 
7 Steps to Threat Modeling
7 Steps to Threat Modeling7 Steps to Threat Modeling
7 Steps to Threat Modeling
Danny Wong
 
The Current ICS Threat Landscape
The Current ICS Threat LandscapeThe Current ICS Threat Landscape
The Current ICS Threat Landscape
Dragos, Inc.
 
Threat Modeling to Reduce Software Security Risk
Threat Modeling to Reduce Software Security RiskThreat Modeling to Reduce Software Security Risk
Threat Modeling to Reduce Software Security Risk
Security Innovation
 
What is Penetration Testing?
What is Penetration Testing?What is Penetration Testing?
What is Penetration Testing?
btpsec
 
VAPT - Vulnerability Assessment & Penetration Testing
VAPT - Vulnerability Assessment & Penetration Testing VAPT - Vulnerability Assessment & Penetration Testing
VAPT - Vulnerability Assessment & Penetration Testing
Netpluz Asia Pte Ltd
 
Cyber Threat Intelligence
Cyber Threat IntelligenceCyber Threat Intelligence
Cyber Threat Intelligence
seadeloitte
 
VAPT PRESENTATION full.pptx
VAPT PRESENTATION full.pptxVAPT PRESENTATION full.pptx
VAPT PRESENTATION full.pptx
DARSHANBHAVSAR14
 

Similar to Threat modelling with_sample_application (20)

06. security concept
06. security concept06. security concept
06. security concept
Muhammad Ahad
 
Management Information Systems
Management Information SystemsManagement Information Systems
Management Information Systems
msd11
 
The 5 Layers of Security Testing by Alan Koch
The 5 Layers of Security Testing by Alan KochThe 5 Layers of Security Testing by Alan Koch
The 5 Layers of Security Testing by Alan Koch
QA or the Highway
 
The 5 Layers of Security Testing by Alan Koch
The 5 Layers of Security Testing by Alan KochThe 5 Layers of Security Testing by Alan Koch
The 5 Layers of Security Testing by Alan Koch
QA or the Highway
 
Skillmine-InfoSecurity-VAPT-V.2.
Skillmine-InfoSecurity-VAPT-V.2.Skillmine-InfoSecurity-VAPT-V.2.
Skillmine-InfoSecurity-VAPT-V.2.
Skillmine Technology Consulting
 
Secure remote work
Secure remote workSecure remote work
Secure remote work
Allessandra Negri
 
UNIT- I & II_ 3R-Cryptography-Lectures_2021-22_VSM.pdf
UNIT- I & II_ 3R-Cryptography-Lectures_2021-22_VSM.pdfUNIT- I & II_ 3R-Cryptography-Lectures_2021-22_VSM.pdf
UNIT- I & II_ 3R-Cryptography-Lectures_2021-22_VSM.pdf
VishwanathMahalle
 
The security mindset securing social media integrations and social learning...
The security mindset   securing social media integrations and social learning...The security mindset   securing social media integrations and social learning...
The security mindset securing social media integrations and social learning...
franco_bb
 
Threat modelling
Threat modellingThreat modelling
Threat modelling
Rajeev Venkata
 
attack vectors by chimwemwe.pptx
attack vectors  by chimwemwe.pptxattack vectors  by chimwemwe.pptx
attack vectors by chimwemwe.pptx
JenetSilence
 
Application security
Application securityApplication security
Application security
Hagar Alaa el-din
 
ThreatModeling.ppt
ThreatModeling.pptThreatModeling.ppt
ThreatModeling.ppt
tashon2
 
Threats and vulnerability , a danger to our valuable data and information.pptx
Threats and vulnerability , a danger to our valuable data and information.pptxThreats and vulnerability , a danger to our valuable data and information.pptx
Threats and vulnerability , a danger to our valuable data and information.pptx
SARVSHRESTH98
 
5 attack vectors behind 3000+ breaches.pdf
5 attack vectors behind 3000+ breaches.pdf5 attack vectors behind 3000+ breaches.pdf
5 attack vectors behind 3000+ breaches.pdf
prithaaash
 
Information system security Unit 1.pptx
Information system security  Unit 1.pptxInformation system security  Unit 1.pptx
Information system security Unit 1.pptx
Dr. Pallawi Bulakh
 
Introduction to Cryptography
Introduction to CryptographyIntroduction to Cryptography
Introduction to Cryptography
UmangThakkar26
 
download-20171010121559download-20171010121559.pptx
download-20171010121559download-20171010121559.pptxdownload-20171010121559download-20171010121559.pptx
download-20171010121559download-20171010121559.pptx
2024proj005
 
Null bachav
Null bachavNull bachav
Null bachav
Naga Venkata Sunil Alamuri
 
Cybersecurity Awareness Training[1][1].pptx
Cybersecurity Awareness Training[1][1].pptxCybersecurity Awareness Training[1][1].pptx
Cybersecurity Awareness Training[1][1].pptx
issaamro986
 
Cybersecurity Awareness Training[1][1].pptx
Cybersecurity Awareness Training[1][1].pptxCybersecurity Awareness Training[1][1].pptx
Cybersecurity Awareness Training[1][1].pptx
issaamro986
 
06. security concept
06. security concept06. security concept
06. security concept
Muhammad Ahad
 
Management Information Systems
Management Information SystemsManagement Information Systems
Management Information Systems
msd11
 
The 5 Layers of Security Testing by Alan Koch
The 5 Layers of Security Testing by Alan KochThe 5 Layers of Security Testing by Alan Koch
The 5 Layers of Security Testing by Alan Koch
QA or the Highway
 
The 5 Layers of Security Testing by Alan Koch
The 5 Layers of Security Testing by Alan KochThe 5 Layers of Security Testing by Alan Koch
The 5 Layers of Security Testing by Alan Koch
QA or the Highway
 
UNIT- I & II_ 3R-Cryptography-Lectures_2021-22_VSM.pdf
UNIT- I & II_ 3R-Cryptography-Lectures_2021-22_VSM.pdfUNIT- I & II_ 3R-Cryptography-Lectures_2021-22_VSM.pdf
UNIT- I & II_ 3R-Cryptography-Lectures_2021-22_VSM.pdf
VishwanathMahalle
 
The security mindset securing social media integrations and social learning...
The security mindset   securing social media integrations and social learning...The security mindset   securing social media integrations and social learning...
The security mindset securing social media integrations and social learning...
franco_bb
 
attack vectors by chimwemwe.pptx
attack vectors  by chimwemwe.pptxattack vectors  by chimwemwe.pptx
attack vectors by chimwemwe.pptx
JenetSilence
 
ThreatModeling.ppt
ThreatModeling.pptThreatModeling.ppt
ThreatModeling.ppt
tashon2
 
Threats and vulnerability , a danger to our valuable data and information.pptx
Threats and vulnerability , a danger to our valuable data and information.pptxThreats and vulnerability , a danger to our valuable data and information.pptx
Threats and vulnerability , a danger to our valuable data and information.pptx
SARVSHRESTH98
 
5 attack vectors behind 3000+ breaches.pdf
5 attack vectors behind 3000+ breaches.pdf5 attack vectors behind 3000+ breaches.pdf
5 attack vectors behind 3000+ breaches.pdf
prithaaash
 
Information system security Unit 1.pptx
Information system security  Unit 1.pptxInformation system security  Unit 1.pptx
Information system security Unit 1.pptx
Dr. Pallawi Bulakh
 
Introduction to Cryptography
Introduction to CryptographyIntroduction to Cryptography
Introduction to Cryptography
UmangThakkar26
 
download-20171010121559download-20171010121559.pptx
download-20171010121559download-20171010121559.pptxdownload-20171010121559download-20171010121559.pptx
download-20171010121559download-20171010121559.pptx
2024proj005
 
Cybersecurity Awareness Training[1][1].pptx
Cybersecurity Awareness Training[1][1].pptxCybersecurity Awareness Training[1][1].pptx
Cybersecurity Awareness Training[1][1].pptx
issaamro986
 
Cybersecurity Awareness Training[1][1].pptx
Cybersecurity Awareness Training[1][1].pptxCybersecurity Awareness Training[1][1].pptx
Cybersecurity Awareness Training[1][1].pptx
issaamro986
 
Ad

More from Umut IŞIK (20)

Açık Kaynağa Nasıl Katkı Yapabiliriz?
Açık Kaynağa Nasıl Katkı Yapabiliriz?Açık Kaynağa Nasıl Katkı Yapabiliriz?
Açık Kaynağa Nasıl Katkı Yapabiliriz?
Umut IŞIK
 
Php projelerinde ci_uygulama
Php projelerinde ci_uygulamaPhp projelerinde ci_uygulama
Php projelerinde ci_uygulama
Umut IŞIK
 
Açık Kaynağa Nasıl Katkı Yapabiliriz?
Açık Kaynağa Nasıl Katkı Yapabiliriz?Açık Kaynağa Nasıl Katkı Yapabiliriz?
Açık Kaynağa Nasıl Katkı Yapabiliriz?
Umut IŞIK
 
A Ci Experience
A Ci ExperienceA Ci Experience
A Ci Experience
Umut IŞIK
 
BBS Flyers 08/2016
BBS Flyers 08/2016BBS Flyers 08/2016
BBS Flyers 08/2016
Umut IŞIK
 
BBS Flyers 07/2016
BBS Flyers 07/2016BBS Flyers 07/2016
BBS Flyers 07/2016
Umut IŞIK
 
BBS Flyers 05/2016
BBS Flyers 05/2016BBS Flyers 05/2016
BBS Flyers 05/2016
Umut IŞIK
 
BBS Flyers 03/2016
BBS Flyers 03/2016BBS Flyers 03/2016
BBS Flyers 03/2016
Umut IŞIK
 
BBS Flyers 02/2016
BBS Flyers 02/2016BBS Flyers 02/2016
BBS Flyers 02/2016
Umut IŞIK
 
BBS Flyers 01/2016
BBS Flyers 01/2016BBS Flyers 01/2016
BBS Flyers 01/2016
Umut IŞIK
 
BBS Flyers 12/2015
BBS Flyers 12/2015BBS Flyers 12/2015
BBS Flyers 12/2015
Umut IŞIK
 
BBS Flyers 11/2015
BBS Flyers 11/2015BBS Flyers 11/2015
BBS Flyers 11/2015
Umut IŞIK
 
BBS Flyers 10/2015
BBS Flyers 10/2015BBS Flyers 10/2015
BBS Flyers 10/2015
Umut IŞIK
 
BBS Flyers 09/2015
BBS Flyers 09/2015BBS Flyers 09/2015
BBS Flyers 09/2015
Umut IŞIK
 
Ionic
IonicIonic
Ionic
Umut IŞIK
 
BBS Flyers 08/2015
BBS Flyers 08/2015BBS Flyers 08/2015
BBS Flyers 08/2015
Umut IŞIK
 
BBS Flyers-07-2015
BBS Flyers-07-2015BBS Flyers-07-2015
BBS Flyers-07-2015
Umut IŞIK
 
BBS Flyers 06/2015
BBS Flyers 06/2015BBS Flyers 06/2015
BBS Flyers 06/2015
Umut IŞIK
 
BBS Flyers 05/2015
BBS Flyers 05/2015BBS Flyers 05/2015
BBS Flyers 05/2015
Umut IŞIK
 
BBS Flyers 04/2015
BBS Flyers 04/2015BBS Flyers 04/2015
BBS Flyers 04/2015
Umut IŞIK
 
Açık Kaynağa Nasıl Katkı Yapabiliriz?
Açık Kaynağa Nasıl Katkı Yapabiliriz?Açık Kaynağa Nasıl Katkı Yapabiliriz?
Açık Kaynağa Nasıl Katkı Yapabiliriz?
Umut IŞIK
 
Php projelerinde ci_uygulama
Php projelerinde ci_uygulamaPhp projelerinde ci_uygulama
Php projelerinde ci_uygulama
Umut IŞIK
 
Açık Kaynağa Nasıl Katkı Yapabiliriz?
Açık Kaynağa Nasıl Katkı Yapabiliriz?Açık Kaynağa Nasıl Katkı Yapabiliriz?
Açık Kaynağa Nasıl Katkı Yapabiliriz?
Umut IŞIK
 
A Ci Experience
A Ci ExperienceA Ci Experience
A Ci Experience
Umut IŞIK
 
BBS Flyers 08/2016
BBS Flyers 08/2016BBS Flyers 08/2016
BBS Flyers 08/2016
Umut IŞIK
 
BBS Flyers 07/2016
BBS Flyers 07/2016BBS Flyers 07/2016
BBS Flyers 07/2016
Umut IŞIK
 
BBS Flyers 05/2016
BBS Flyers 05/2016BBS Flyers 05/2016
BBS Flyers 05/2016
Umut IŞIK
 
BBS Flyers 03/2016
BBS Flyers 03/2016BBS Flyers 03/2016
BBS Flyers 03/2016
Umut IŞIK
 
BBS Flyers 02/2016
BBS Flyers 02/2016BBS Flyers 02/2016
BBS Flyers 02/2016
Umut IŞIK
 
BBS Flyers 01/2016
BBS Flyers 01/2016BBS Flyers 01/2016
BBS Flyers 01/2016
Umut IŞIK
 
BBS Flyers 12/2015
BBS Flyers 12/2015BBS Flyers 12/2015
BBS Flyers 12/2015
Umut IŞIK
 
BBS Flyers 11/2015
BBS Flyers 11/2015BBS Flyers 11/2015
BBS Flyers 11/2015
Umut IŞIK
 
BBS Flyers 10/2015
BBS Flyers 10/2015BBS Flyers 10/2015
BBS Flyers 10/2015
Umut IŞIK
 
BBS Flyers 09/2015
BBS Flyers 09/2015BBS Flyers 09/2015
BBS Flyers 09/2015
Umut IŞIK
 
BBS Flyers 08/2015
BBS Flyers 08/2015BBS Flyers 08/2015
BBS Flyers 08/2015
Umut IŞIK
 
BBS Flyers-07-2015
BBS Flyers-07-2015BBS Flyers-07-2015
BBS Flyers-07-2015
Umut IŞIK
 
BBS Flyers 06/2015
BBS Flyers 06/2015BBS Flyers 06/2015
BBS Flyers 06/2015
Umut IŞIK
 
BBS Flyers 05/2015
BBS Flyers 05/2015BBS Flyers 05/2015
BBS Flyers 05/2015
Umut IŞIK
 
BBS Flyers 04/2015
BBS Flyers 04/2015BBS Flyers 04/2015
BBS Flyers 04/2015
Umut IŞIK
 
Ad

Threat modelling with_sample_application

  • 1. Umut IŞIK Threat Modelling With a sample application
  • 2. 1. Threat Modelling 2. Sample Application 3. Threat Model Of The Application 4. Resources Table Of Contents
  • 3. An approach for analyzing the security of an application Security? ▪ protect applications from external threats ▪ protect data integrity ▪ protect service 1.Threat Modelling
  • 4. Vocabulary ▪ Asset; A resource of value such as the data in a database ▪ Threat; Anything that can exploit a vulnerability and obtain, damage, or destroy an asset. ▪ Vulnerability; A weakness or gap in security program that can be exploited by threats to gain unauthorized access to an asset. ▪ Attack (or exploit); An action taken to harm an asset. ▪ Countermeasure; A safeguard that addresses a threat and mitigates risk. 1.Threat Modelling
  • 5. The model can be decomposed into three steps 1. Decompose the application 2. Determine and rank threats 3. Determine countermeasures and migitation 1.Threat Modelling
  • 6. 1.1. Decompose the application Understanding of the application ▪ External Dependencies ▪ Entry points: sources of input to your application ▪ Assets ▪ Roles: sets of priviledges, trust levels 1.Threat Modelling
  • 7. 1.2. Determine and rank threats Categorization of threats (by attackers goal) ▪ Spoofing: Illegal access ▪ Tampering: Maliciously add/modify persistent data ▪ Repudiation: ▪ Information Disclosure: Read data that was not granted ▪ Denial of Service: Make service unavailable ▪ Elevation of Privilege: Gain privileged access 1.Threat Modelling
  • 8. 1.2. Determine and rank threats Threats should be ranked according to risk (1-10) (D + R + E + A + D)/5 ▪ Damage; ▪ Reproducibility; ▪ Exploitability; ▪ Affected Users; ▪ Discoverability; 1.Threat Modelling
  • 9. 1.2. Determine and rank threats What is risk? Risk = Likelihood X Impact 1.Threat Modelling
  • 10. 1.2. Determine and rank threats Likelihood is probability and possibility of the attack. 1. Can an attacker exploit the attack remotely? 2. Is the authentication required? 3. Can it be automated? 1.Threat Modelling
  • 11. 1.2. Determine and rank threats Impact is the potential damage and the extent of the damage. Can the attacker 1. take over the system complety? 2. gain administration access to the system? 3. crash the system? 4. access to sensitive information? 1.Threat Modelling
  • 12. 1.2. Determine and rank threats Impact is the potential damage and the extent of the damage. 1. How many data sources and components can be impacted? 2. How deep can the threat agent go? 1.Threat Modelling
  • 13. 1.3. Determine countermeasures and mitigation Security Controls 1.Threat Modelling Type Security Control Spoofing Authentication, protect secrets, don’t store secrets Tampering Integrity, hash, digital signature, tamper resistant protocols Repudiation Non-Repudiation, digital signature Information Disclosure Confidentiality, privacy enhanced protocols,encryption,protect secrets,don’t store secrets Denial of Service Authentication, authorization, filtering, throttling, quality of service Elevation of privilege Authorization, least priviledge
  • 14. 1.3. Determine countermeasures and mitigation Mitigation Strategy 1. Do nothing 2. Inform about the risk 3. Mitigate the risk 4. Accept the risk 5. Transfer the risk 6. Terminate the risk 1.Threat Modelling
  • 15. Content Translation Memory (TM) ▪ Memory between internal CMSs to external translation agencies ▪ UI for users to update memory ▪ Service layer for CMS aplications to send and receive data ▪ FTP file transfer to translation agency 2. Sample Application
  • 17. 3.1. Decomposing the Application External Dependencies 3. Threat Model Of The Application ID Description Protection Migitation Strategy 1 The application will run on a Linux server running Apache. The server will be hardenned by creating a lates version strategy Transfer the risk 2 The database server will be Mysql The server will be hardenned by creating a lates version strategy Transfer the risk 3 The connection between application and the database Over a private network Terminate the risks
  • 18. 3.1. Decomposing the Application Entry Points 3. Threat Model Of The Application ID Name Description Trust Level/Role Migitation Strategy 1 User Interface: • Login Page • Edit Translation • Edit Transaction • Reports All Pages should be accessible via TLS Anonymous User, User with valid credentials Migitate the risk 2 Service Layer All services should be accessible via TLS Service User with valid API key Migitate the risk 3 FTP connection Connect to an external FTP server via TLS User with valid credentials Migitate the risk
  • 19. 3.1. Decomposing the Application Assets 3. Threat Model Of The Application ID Name Description Trust Level/Role 1 Content Content data User with valid credentials, Service User with valid API key 2 User data usernames, passwords User with valid credentials 3 Transaction information Locale assignment, translation status User with valid credentials
  • 20. 3.2. Threat Profile ▪ Brainstorm about threats ▪ Avoid thinking about solutions ▪ Give proper unique for each threat 3. Threat Model Of The Application
  • 21. 3.2. Threat Profile Threat #1 Atacker steals authentication credentials Rank: 8 ▪ Credentials are cached to insecure locations on the client system ▪ Credentials are sent as GET parameters that may be cached. 3. Threat Model Of The Application
  • 22. 3.2. Threat Profile Threat #2 Atacker logins with brute force Rank: 8 ▪ The Logon page does not properly sanitize input ▪ Functionality accessible only after logging in can be called directly ▪ Credentials are cached locally. ▪ Credentials are present in the form of comments in JavaScript. ▪ Authentication is handled on the client (JavaScript). ▪ Persistent cookies are stored in the browser. ▪ Weak passwords are in use. 3. Threat Model Of The Application
  • 23. 3.2. Threat Profile Threat #3 An attacker can launch a denial of service attack Rank: 9 ▪ Poorly configured account lockout policy in place. ▪ Absence of CAPTCHA allowing users to fill up a backend database with useless data via public registration forms. 3. Threat Model Of The Application