Corporate Threat Modeling v2

64
1

description

Presentation by Charl der Walt and Francesco Geremla at The ITweb security summit in 2009. This presentation is about the methodology behind version 2 of Sensepost's threat modeling tool, the corporate threat modeller.

Transcript of Corporate Threat Modeling v2

Page 1: Corporate Threat Modeling v2

1

Page 2: Corporate Threat Modeling v2

2

Page 3: Corporate Threat Modeling v2

3

Page 4: Corporate Threat Modeling v2

4

Page 5: Corporate Threat Modeling v2

5

Page 6: Corporate Threat Modeling v2

6

Page 7: Corporate Threat Modeling v2

7

Page 8: Corporate Threat Modeling v2

8

Single loss expectancy (SLE) is the value you expect to lose each time a risk

occurs. You calculate SLE by using the following formula: SLE = AV x EF

Page 9: Corporate Threat Modeling v2

9

Single loss expectancy (SLE) is the value you expect to lose each time a risk

occurs. You calculate SLE by using the following formula: SLE = AV x EF

Page 10: Corporate Threat Modeling v2

10

Annual loss expectancy (ALE) is the value you expect to lose to a given risk

each year. You calculate ALE by using the following formula: ALE = SLE x

ARO

Page 11: Corporate Threat Modeling v2

11

Annual loss expectancy (ALE) is the value you expect to lose to a given risk

each year. You calculate ALE by using the following formula: ALE = SLE x

ARO

Page 12: Corporate Threat Modeling v2

12

Annual loss expectancy (ALE) is the value you expect to lose to a given risk

each year. You calculate ALE by using the following formula: ALE = SLE x

ARO

Page 13: Corporate Threat Modeling v2

13

Page 14: Corporate Threat Modeling v2

14

Page 15: Corporate Threat Modeling v2

15

Page 16: Corporate Threat Modeling v2

16

Page 17: Corporate Threat Modeling v2

17

Page 18: Corporate Threat Modeling v2

18

Page 19: Corporate Threat Modeling v2

19

Microsoft says:

Provides a consistent methodology for objectively identifying and evaluating

threats to applications.

Translates technical risk to business impact.

Empowers a business to manage risk.

Creates awareness among teams of security dependencies and assumptions.

Page 20: Corporate Threat Modeling v2

20

Page 21: Corporate Threat Modeling v2

21

Step 1: Identify security objectives.

Clear objectives help you to focus the threat modeling activity and determine

how much effort to spend on subsequent steps.

Step 2: Create an application overview.

Itemizing your application's important characteristics and actors helps you to

identify relevant threats during step 4.

Step 3: Decompose your application.

A detailed understanding of the mechanics of your application makes it easier

for you to uncover more relevant and more detailed threats.

Step 4: Identify threats.

Use details from steps 2 and 3 to identify threats relevant to your application

scenario and context.

Step 5: Identify vulnerabilities.

Review the layers of your application to identify weaknesses related to your

threats. Use vulnerability categories to help you focus on those areas where

mistakes are most often made.

Page 22: Corporate Threat Modeling v2

22

Page 23: Corporate Threat Modeling v2

23

Page 24: Corporate Threat Modeling v2

24

Page 25: Corporate Threat Modeling v2

25

Page 26: Corporate Threat Modeling v2

26

Page 27: Corporate Threat Modeling v2

27

Would prefer to use a diagram here

Page 28: Corporate Threat Modeling v2

28

Page 29: Corporate Threat Modeling v2

29

Page 30: Corporate Threat Modeling v2

30

Page 31: Corporate Threat Modeling v2

31

Page 32: Corporate Threat Modeling v2

32

Page 33: Corporate Threat Modeling v2

33

Page 34: Corporate Threat Modeling v2

34

Page 35: Corporate Threat Modeling v2

35

Page 36: Corporate Threat Modeling v2

36

Page 37: Corporate Threat Modeling v2

37

Define Locations, Interfaces & Users (Trust Levels) But not “assets”, as

organizations are too complex

Create a map showing how Locations, Users and Interfaces relate

Users are restricted to locations

Interfaces are exposed to locations

Page 38: Corporate Threat Modeling v2

38

Risks are gleamed from three sources

Analyst Experience

Organizational History

Group Brainstorming

Each Risk has key elements

Likelihood

Impact

Use an iterative process to describe the Risk, apply it to an Interface, then refine as required

A new Risk is added if:

Likelihood or Impact differs

The required defense is likely to differ

Page 39: Corporate Threat Modeling v2

39

This creates a Threat Vector

Directly linked:

What Interfaces could this Risk Impact?

Indirectly linked:

What Trust Level is required?

At which location would such Users be found?

Page 40: Corporate Threat Modeling v2

40

The Threat Vector therefore becomes a 4-Tuple

Risk, Interface, Location, User

A many-to-many relation means the number of Threat Vectors scales

linearly

Page 41: Corporate Threat Modeling v2

41

Tests could be any of

Focused Technical Tests

E.g. Penetration Test

Sample Data

Drawn from existing monitoring systems e.g. Incident Logs or previous assessments

Interviews

Conducted with relevant individuals or teams

Policy and procedure reviews

Research

Drawing on external sources

The more tests are conducted the more certainty we have

However, the most ‘efficient’ tests are easily calculated by considering the Weights of all the Threat Vectors impacted

Page 42: Corporate Threat Modeling v2

44

Page 43: Corporate Threat Modeling v2

45

Page 44: Corporate Threat Modeling v2

46

Page 45: Corporate Threat Modeling v2

47

Page 46: Corporate Threat Modeling v2

48

Page 47: Corporate Threat Modeling v2

49

Page 48: Corporate Threat Modeling v2

50

Page 49: Corporate Threat Modeling v2

51

Page 50: Corporate Threat Modeling v2

52

Page 51: Corporate Threat Modeling v2

53

Page 52: Corporate Threat Modeling v2

54

Page 53: Corporate Threat Modeling v2

55

Page 54: Corporate Threat Modeling v2

56

Page 55: Corporate Threat Modeling v2

57

Page 56: Corporate Threat Modeling v2

58

Page 57: Corporate Threat Modeling v2

59

Page 58: Corporate Threat Modeling v2

60

Page 59: Corporate Threat Modeling v2

61

Page 60: Corporate Threat Modeling v2

62

Page 61: Corporate Threat Modeling v2

63

Page 62: Corporate Threat Modeling v2

64

Page 63: Corporate Threat Modeling v2

65

Page 64: Corporate Threat Modeling v2

66