[Lithuania] Introduction to threat modeling

OWASP EEE
Introduction to
threat modeling
OWASP EEE 2015
About me
Audrius Kovalenko | @slicklash
NOT Computer Security Expert
Just a developer
Prelude
Princess
in your possession
You’ve built a castle
for a princess
Thieves
want to take her away
Your castle has a weakness
“dead” zones
You guard them
mitigation
Threat modeling
software project
What are you building?
data flow diagram
Decomposition
roles
User Roles
Name Description Authentication
Admin Administrators have complete and unrestricted access to Notices, Partner Accounts and Logs. Windows
Partner Partners can create, read and update Notices. Basic
User Users can read and update Notices. Forms
Service Roles
Name Description Authentication
APP Role Identity APP is running as. Windows Integrated (ApplicationPoolIndentity)
SVC Role Identity SVC is running as. Windows Integrated (Local System)
MSMQ Role Identity MSMQ is running as. Windows Integrated (Network Service)
Decomposition (2)
components
Components
Name Roles Type Run As Communication Channel Technology Uses
APP Admin
User
Website APP Role HTTPS C#, ASP.NET MVC 5 Cryptography,
File I/O
API Partner Website API Role HTTPS C#, ASP.NET MVC 5 Cryptography,
File I/O
SVC MSMQ Windows
Service
SVC Role TCP/IP C# Cryptography,
File I/O
Decomposition (3)
data
Data
Name Description Data Elements Data Stores
Form Defines structure of a Notice Fields Database
Access Control
Role Access Control Remarks
Admin C R U D
Partner R Limited information. Form must be published.
User
What can go wrong?
card games
What can go wrong? (2)
checklists
CAPEC
https://capec.mitre.org/data/index.html
OWASP ASVS
https://www.owasp.org/index.php/Category:OWASP_Application_Security_Verification...
OWASP AppSensor
https://www.owasp.org/index.php/AppSensor_DetectionPoints
How to prioritize?
convert threat to risk
Risk
Loss event
frequence
Loss
magnitude
Threat event
frequence
prob. Threat agent actions
result in loss
How to mitigate?
raise the cost
Time
Skills
Money
etc.
capability
How to make it work for you?
Practice
Experience
Reflection
Theory
find your own way
Books
FAIR STRIDE PASTA
Resources
OWASP Cornucopia
https://www.owasp.org/index.php/OWASP_Cornucopia
EoP Card Game
https://www.microsoft.com/en-us/SDL/adopt/eop.aspx
STRIDE
http://blogs.microsoft.com/cybertrust/2007/09/11/stride-chart
FAIR
http://www.risklens.com/what-is-fair
SAFECode
http://www.safecode.org/publications
QA
1 of 21

Recommended

Security of Web Applications: Top 6 Risks To Avoid by
Security of Web Applications: Top 6 Risks To AvoidSecurity of Web Applications: Top 6 Risks To Avoid
Security of Web Applications: Top 6 Risks To Avoidslicklash
1.9K views35 slides
Introduction to Threat Modeling by
Introduction to Threat ModelingIntroduction to Threat Modeling
Introduction to Threat Modelingslicklash
844 views21 slides
Selenium -Test automation for web applications by
Selenium -Test automation for web applicationsSelenium -Test automation for web applications
Selenium -Test automation for web applicationsAnisGhelissi
144 views33 slides
تست وب اپ ها با سلنیوم - علیرضا عظیم زاده میلانی by
تست وب اپ ها با سلنیوم - علیرضا عظیم زاده میلانیتست وب اپ ها با سلنیوم - علیرضا عظیم زاده میلانی
تست وب اپ ها با سلنیوم - علیرضا عظیم زاده میلانیirpycon
652 views23 slides
Intro to silverlight_20110602 by
Intro to silverlight_20110602Intro to silverlight_20110602
Intro to silverlight_20110602Ethos Technologies
335 views12 slides
Security Threats and Solutions of Cloud Computing by
Security Threats and Solutions of Cloud ComputingSecurity Threats and Solutions of Cloud Computing
Security Threats and Solutions of Cloud ComputingKartik Shenoy
212 views19 slides

More Related Content

What's hot

Updated Resume_ram by
Updated Resume_ramUpdated Resume_ram
Updated Resume_ramramudu k
169 views3 slides
Api server final by
Api server finalApi server final
Api server finalInayat Sharief
134 views16 slides
Saml sso by Tamil on nullblrmeet 21st July 2015 by
Saml sso by Tamil on nullblrmeet 21st July 2015Saml sso by Tamil on nullblrmeet 21st July 2015
Saml sso by Tamil on nullblrmeet 21st July 2015n|u - The Open Security Community
1.2K views11 slides
Authentication and Authorization in Asp.Net by
Authentication and Authorization in Asp.NetAuthentication and Authorization in Asp.Net
Authentication and Authorization in Asp.NetShivanand Arur
12.7K views20 slides
Asp.net membership anduserroles_ppt by
Asp.net membership anduserroles_pptAsp.net membership anduserroles_ppt
Asp.net membership anduserroles_pptShivanand Arur
2.9K views17 slides
Building an SSO platform in php (Zendcon 2010) by
Building an SSO platform in php (Zendcon 2010)Building an SSO platform in php (Zendcon 2010)
Building an SSO platform in php (Zendcon 2010)Ivo Jansch
11.1K views59 slides

What's hot(20)

Updated Resume_ram by ramudu k
Updated Resume_ramUpdated Resume_ram
Updated Resume_ram
ramudu k169 views
Authentication and Authorization in Asp.Net by Shivanand Arur
Authentication and Authorization in Asp.NetAuthentication and Authorization in Asp.Net
Authentication and Authorization in Asp.Net
Shivanand Arur12.7K views
Asp.net membership anduserroles_ppt by Shivanand Arur
Asp.net membership anduserroles_pptAsp.net membership anduserroles_ppt
Asp.net membership anduserroles_ppt
Shivanand Arur2.9K views
Building an SSO platform in php (Zendcon 2010) by Ivo Jansch
Building an SSO platform in php (Zendcon 2010)Building an SSO platform in php (Zendcon 2010)
Building an SSO platform in php (Zendcon 2010)
Ivo Jansch11.1K views
SSO using CAS + two-factor authentication (PyGrunn 2014 talk) by Artur Barseghyan
SSO using CAS + two-factor authentication (PyGrunn 2014 talk)SSO using CAS + two-factor authentication (PyGrunn 2014 talk)
SSO using CAS + two-factor authentication (PyGrunn 2014 talk)
Artur Barseghyan7.6K views
Session2(Mod) by mccmepco
Session2(Mod)Session2(Mod)
Session2(Mod)
mccmepco569 views
CAS Enhancement by Guo Albert
CAS EnhancementCAS Enhancement
CAS Enhancement
Guo Albert1.6K views
Visi Flex Accelerator Framework by efinver
Visi Flex Accelerator FrameworkVisi Flex Accelerator Framework
Visi Flex Accelerator Framework
efinver385 views
SharePoint 2010, Claims-Based Identity, Facebook, and the Cloud by Danny Jessee
SharePoint 2010, Claims-Based Identity, Facebook, and the CloudSharePoint 2010, Claims-Based Identity, Facebook, and the Cloud
SharePoint 2010, Claims-Based Identity, Facebook, and the Cloud
Danny Jessee7.8K views
SPS Belgium 2015 - High-trust Apps for On-Premises Development by Edin Kapic
SPS Belgium 2015 -  High-trust Apps for On-Premises DevelopmentSPS Belgium 2015 -  High-trust Apps for On-Premises Development
SPS Belgium 2015 - High-trust Apps for On-Premises Development
Edin Kapic500 views
Jasig Central Authentication Service in Ten Minutes by Andrew Petro
Jasig Central Authentication Service in Ten MinutesJasig Central Authentication Service in Ten Minutes
Jasig Central Authentication Service in Ten Minutes
Andrew Petro4.8K views
Claims-Based Identity in SharePoint 2010 by Danny Jessee
Claims-Based Identity in SharePoint 2010Claims-Based Identity in SharePoint 2010
Claims-Based Identity in SharePoint 2010
Danny Jessee6.3K views
Building a chat app with windows azure mobile by Flavius-Radu Demian
Building a chat app with windows azure mobileBuilding a chat app with windows azure mobile
Building a chat app with windows azure mobile
Flavius-Radu Demian1.4K views

Viewers also liked

[Russia] Node.JS - Architecture and Vulnerabilities by
[Russia] Node.JS - Architecture and Vulnerabilities[Russia] Node.JS - Architecture and Vulnerabilities
[Russia] Node.JS - Architecture and VulnerabilitiesOWASP EEE
560 views15 slides
[Bucharest] Catching up with today's malicious actors by
[Bucharest] Catching up with today's malicious actors[Bucharest] Catching up with today's malicious actors
[Bucharest] Catching up with today's malicious actorsOWASP EEE
431 views25 slides
[Bucharest] XML Based Attacks by
[Bucharest] XML Based Attacks[Bucharest] XML Based Attacks
[Bucharest] XML Based AttacksOWASP EEE
610 views25 slides
[Poland] It's only about frontend by
[Poland] It's only about frontend[Poland] It's only about frontend
[Poland] It's only about frontendOWASP EEE
521 views56 slides
[Austria] Security by Design by
[Austria] Security by Design[Austria] Security by Design
[Austria] Security by DesignOWASP EEE
665 views16 slides
Dia da Música by
Dia da MúsicaDia da Música
Dia da MúsicaPaulo Antunes
1.2K views18 slides

Viewers also liked(12)

[Russia] Node.JS - Architecture and Vulnerabilities by OWASP EEE
[Russia] Node.JS - Architecture and Vulnerabilities[Russia] Node.JS - Architecture and Vulnerabilities
[Russia] Node.JS - Architecture and Vulnerabilities
OWASP EEE560 views
[Bucharest] Catching up with today's malicious actors by OWASP EEE
[Bucharest] Catching up with today's malicious actors[Bucharest] Catching up with today's malicious actors
[Bucharest] Catching up with today's malicious actors
OWASP EEE431 views
[Bucharest] XML Based Attacks by OWASP EEE
[Bucharest] XML Based Attacks[Bucharest] XML Based Attacks
[Bucharest] XML Based Attacks
OWASP EEE610 views
[Poland] It's only about frontend by OWASP EEE
[Poland] It's only about frontend[Poland] It's only about frontend
[Poland] It's only about frontend
OWASP EEE521 views
[Austria] Security by Design by OWASP EEE
[Austria] Security by Design[Austria] Security by Design
[Austria] Security by Design
OWASP EEE665 views
RESUME OF MAHFUZUR RAHMAN_Oct' 15 by Mahfuzur Rahman
RESUME OF MAHFUZUR RAHMAN_Oct' 15RESUME OF MAHFUZUR RAHMAN_Oct' 15
RESUME OF MAHFUZUR RAHMAN_Oct' 15
Mahfuzur Rahman317 views
[Lithuania] DigiCerts and DigiID to Enterprise apps by OWASP EEE
[Lithuania] DigiCerts and DigiID to Enterprise apps[Lithuania] DigiCerts and DigiID to Enterprise apps
[Lithuania] DigiCerts and DigiID to Enterprise apps
OWASP EEE350 views
[Lithuania] I am the cavalry by OWASP EEE
[Lithuania] I am the cavalry[Lithuania] I am the cavalry
[Lithuania] I am the cavalry
OWASP EEE539 views
[Cluj] CSP (Content Security Policy) by OWASP EEE
[Cluj] CSP (Content Security Policy)[Cluj] CSP (Content Security Policy)
[Cluj] CSP (Content Security Policy)
OWASP EEE576 views
[Russia] Give me a stable input by OWASP EEE
[Russia] Give me a stable input[Russia] Give me a stable input
[Russia] Give me a stable input
OWASP EEE335 views
[Russia] MySQL OOB injections by OWASP EEE
[Russia] MySQL OOB injections[Russia] MySQL OOB injections
[Russia] MySQL OOB injections
OWASP EEE1.6K views

Similar to [Lithuania] Introduction to threat modeling

Joe Staner Zend Con 2008 by
Joe Staner Zend Con 2008Joe Staner Zend Con 2008
Joe Staner Zend Con 2008ZendCon
1.1K views61 slides
J2 Ee Vs. .Net Workshop by
J2 Ee Vs. .Net WorkshopJ2 Ee Vs. .Net Workshop
J2 Ee Vs. .Net Workshopdanglvh
1.1K views42 slides
Pragatheswarakumar_v1.0 by
Pragatheswarakumar_v1.0Pragatheswarakumar_v1.0
Pragatheswarakumar_v1.0Pragatheswarakumar kandasamy
395 views3 slides
Writing Mobile Apps in the cloud with FeedHenry by
Writing Mobile Apps in the cloud with FeedHenryWriting Mobile Apps in the cloud with FeedHenry
Writing Mobile Apps in the cloud with FeedHenryCian Clarke
1.2K views27 slides
Application Of A Macbook Pro And Os X by
Application Of A Macbook Pro And Os XApplication Of A Macbook Pro And Os X
Application Of A Macbook Pro And Os XKris Cundiff
2 views46 slides
2010.11.27 - ITSpark ofline meeting #1, Cluj - Arhitecturi in Windows Azure (... by
2010.11.27 - ITSpark ofline meeting #1, Cluj - Arhitecturi in Windows Azure (...2010.11.27 - ITSpark ofline meeting #1, Cluj - Arhitecturi in Windows Azure (...
2010.11.27 - ITSpark ofline meeting #1, Cluj - Arhitecturi in Windows Azure (...ITSpark Community
316 views25 slides

Similar to [Lithuania] Introduction to threat modeling(20)

Joe Staner Zend Con 2008 by ZendCon
Joe Staner Zend Con 2008Joe Staner Zend Con 2008
Joe Staner Zend Con 2008
ZendCon1.1K views
J2 Ee Vs. .Net Workshop by danglvh
J2 Ee Vs. .Net WorkshopJ2 Ee Vs. .Net Workshop
J2 Ee Vs. .Net Workshop
danglvh1.1K views
Writing Mobile Apps in the cloud with FeedHenry by Cian Clarke
Writing Mobile Apps in the cloud with FeedHenryWriting Mobile Apps in the cloud with FeedHenry
Writing Mobile Apps in the cloud with FeedHenry
Cian Clarke1.2K views
Application Of A Macbook Pro And Os X by Kris Cundiff
Application Of A Macbook Pro And Os XApplication Of A Macbook Pro And Os X
Application Of A Macbook Pro And Os X
Kris Cundiff2 views
2010.11.27 - ITSpark ofline meeting #1, Cluj - Arhitecturi in Windows Azure (... by ITSpark Community
2010.11.27 - ITSpark ofline meeting #1, Cluj - Arhitecturi in Windows Azure (...2010.11.27 - ITSpark ofline meeting #1, Cluj - Arhitecturi in Windows Azure (...
2010.11.27 - ITSpark ofline meeting #1, Cluj - Arhitecturi in Windows Azure (...
ITSpark Community316 views
CTU June 2011 - Windows Azure App Fabric by Spiffy
CTU June 2011 - Windows Azure App FabricCTU June 2011 - Windows Azure App Fabric
CTU June 2011 - Windows Azure App Fabric
Spiffy1.5K views
Trusted by Default: The Forge Security & Privacy Model by Atlassian
Trusted by Default: The Forge Security & Privacy ModelTrusted by Default: The Forge Security & Privacy Model
Trusted by Default: The Forge Security & Privacy Model
Atlassian7.3K views
Pentesting With Web Services in 2012 by Ishan Girdhar
Pentesting With Web Services in 2012Pentesting With Web Services in 2012
Pentesting With Web Services in 2012
Ishan Girdhar3K views
Partying with PHP (…and the Microsoft Platform) by goodfriday
Partying with PHP (…and the Microsoft Platform)Partying with PHP (…and the Microsoft Platform)
Partying with PHP (…and the Microsoft Platform)
goodfriday987 views
Summerinternship by Kiran Kumar
SummerinternshipSummerinternship
Summerinternship
Kiran Kumar1.6K views
API Testing and Hacking (1).pdf by Vishwas N
API Testing and Hacking (1).pdfAPI Testing and Hacking (1).pdf
API Testing and Hacking (1).pdf
Vishwas N308 views
API Testing and Hacking.pdf by Vishwas N
API Testing and Hacking.pdfAPI Testing and Hacking.pdf
API Testing and Hacking.pdf
Vishwas N58 views
API Testing and Hacking.pdf by VishwasN6
API Testing and Hacking.pdfAPI Testing and Hacking.pdf
API Testing and Hacking.pdf
VishwasN6182 views

More from OWASP EEE

[Austria] ZigBee exploited by
[Austria] ZigBee exploited[Austria] ZigBee exploited
[Austria] ZigBee exploitedOWASP EEE
747 views48 slides
[Austria] How we hacked an online mobile banking Trojan by
[Austria] How we hacked an online mobile banking Trojan[Austria] How we hacked an online mobile banking Trojan
[Austria] How we hacked an online mobile banking TrojanOWASP EEE
654 views41 slides
[Poland] SecOps live cooking with OWASP appsec tools by
[Poland] SecOps live cooking with OWASP appsec tools[Poland] SecOps live cooking with OWASP appsec tools
[Poland] SecOps live cooking with OWASP appsec toolsOWASP EEE
461 views35 slides
[Cluj] Turn SSL ON by
[Cluj] Turn SSL ON[Cluj] Turn SSL ON
[Cluj] Turn SSL ONOWASP EEE
406 views16 slides
[Cluj] Information Security Through Gamification by
[Cluj] Information Security Through Gamification[Cluj] Information Security Through Gamification
[Cluj] Information Security Through GamificationOWASP EEE
585 views17 slides
[Cluj] A distributed - collaborative client certification system by
[Cluj] A distributed - collaborative client certification system[Cluj] A distributed - collaborative client certification system
[Cluj] A distributed - collaborative client certification systemOWASP EEE
163 views14 slides

More from OWASP EEE(17)

[Austria] ZigBee exploited by OWASP EEE
[Austria] ZigBee exploited[Austria] ZigBee exploited
[Austria] ZigBee exploited
OWASP EEE747 views
[Austria] How we hacked an online mobile banking Trojan by OWASP EEE
[Austria] How we hacked an online mobile banking Trojan[Austria] How we hacked an online mobile banking Trojan
[Austria] How we hacked an online mobile banking Trojan
OWASP EEE654 views
[Poland] SecOps live cooking with OWASP appsec tools by OWASP EEE
[Poland] SecOps live cooking with OWASP appsec tools[Poland] SecOps live cooking with OWASP appsec tools
[Poland] SecOps live cooking with OWASP appsec tools
OWASP EEE461 views
[Cluj] Turn SSL ON by OWASP EEE
[Cluj] Turn SSL ON[Cluj] Turn SSL ON
[Cluj] Turn SSL ON
OWASP EEE406 views
[Cluj] Information Security Through Gamification by OWASP EEE
[Cluj] Information Security Through Gamification[Cluj] Information Security Through Gamification
[Cluj] Information Security Through Gamification
OWASP EEE585 views
[Cluj] A distributed - collaborative client certification system by OWASP EEE
[Cluj] A distributed - collaborative client certification system[Cluj] A distributed - collaborative client certification system
[Cluj] A distributed - collaborative client certification system
OWASP EEE163 views
[Russia] Bugs -> max, time <= T by OWASP EEE
[Russia] Bugs -> max, time <= T[Russia] Bugs -> max, time <= T
[Russia] Bugs -> max, time <= T
OWASP EEE346 views
[Russia] Building better product security by OWASP EEE
[Russia] Building better product security[Russia] Building better product security
[Russia] Building better product security
OWASP EEE382 views
[Lithuania] Cross-site request forgery: ways to exploit, ways to prevent by OWASP EEE
[Lithuania] Cross-site request forgery: ways to exploit, ways to prevent[Lithuania] Cross-site request forgery: ways to exploit, ways to prevent
[Lithuania] Cross-site request forgery: ways to exploit, ways to prevent
OWASP EEE774 views
[Hungary] I play Jack of Information Disclosure by OWASP EEE
[Hungary] I play Jack of Information Disclosure[Hungary] I play Jack of Information Disclosure
[Hungary] I play Jack of Information Disclosure
OWASP EEE510 views
[Hungary] Survival is not mandatory. The air force one has departured are you... by OWASP EEE
[Hungary] Survival is not mandatory. The air force one has departured are you...[Hungary] Survival is not mandatory. The air force one has departured are you...
[Hungary] Survival is not mandatory. The air force one has departured are you...
OWASP EEE378 views
[Hungary] Secure Software? Start appreciating your developers! by OWASP EEE
[Hungary] Secure Software? Start appreciating your developers![Hungary] Secure Software? Start appreciating your developers!
[Hungary] Secure Software? Start appreciating your developers!
OWASP EEE237 views
[Bucharest] Your intents are dirty, droid! by OWASP EEE
[Bucharest] Your intents are dirty, droid![Bucharest] Your intents are dirty, droid!
[Bucharest] Your intents are dirty, droid!
OWASP EEE390 views
[Bucharest] #DontTrustTheDarkSide by OWASP EEE
[Bucharest] #DontTrustTheDarkSide[Bucharest] #DontTrustTheDarkSide
[Bucharest] #DontTrustTheDarkSide
OWASP EEE517 views
[Bucharest] From SCADA to IoT Cyber Security by OWASP EEE
[Bucharest] From SCADA to IoT Cyber Security[Bucharest] From SCADA to IoT Cyber Security
[Bucharest] From SCADA to IoT Cyber Security
OWASP EEE1.1K views
[Bucharest] Reversing the Apple Sandbox by OWASP EEE
[Bucharest] Reversing the Apple Sandbox[Bucharest] Reversing the Apple Sandbox
[Bucharest] Reversing the Apple Sandbox
OWASP EEE338 views
[Bucharest] Attack is easy, let's talk defence by OWASP EEE
[Bucharest] Attack is easy, let's talk defence[Bucharest] Attack is easy, let's talk defence
[Bucharest] Attack is easy, let's talk defence
OWASP EEE792 views

Recently uploaded

How to think like a threat actor for Kubernetes.pptx by
How to think like a threat actor for Kubernetes.pptxHow to think like a threat actor for Kubernetes.pptx
How to think like a threat actor for Kubernetes.pptxLibbySchulze1
5 views33 slides
Affiliate Marketing by
Affiliate MarketingAffiliate Marketing
Affiliate MarketingNavin Dhanuka
17 views30 slides
hamro digital logics.pptx by
hamro digital logics.pptxhamro digital logics.pptx
hamro digital logics.pptxtupeshghimire
10 views36 slides
ATPMOUSE_융합2조.pptx by
ATPMOUSE_융합2조.pptxATPMOUSE_융합2조.pptx
ATPMOUSE_융합2조.pptxkts120898
35 views70 slides
Marketing and Community Building in Web3 by
Marketing and Community Building in Web3Marketing and Community Building in Web3
Marketing and Community Building in Web3Federico Ast
14 views64 slides
The Dark Web : Hidden Services by
The Dark Web : Hidden ServicesThe Dark Web : Hidden Services
The Dark Web : Hidden ServicesAnshu Singh
14 views24 slides

Recently uploaded(6)

How to think like a threat actor for Kubernetes.pptx by LibbySchulze1
How to think like a threat actor for Kubernetes.pptxHow to think like a threat actor for Kubernetes.pptx
How to think like a threat actor for Kubernetes.pptx
LibbySchulze15 views
ATPMOUSE_융합2조.pptx by kts120898
ATPMOUSE_융합2조.pptxATPMOUSE_융합2조.pptx
ATPMOUSE_융합2조.pptx
kts12089835 views
Marketing and Community Building in Web3 by Federico Ast
Marketing and Community Building in Web3Marketing and Community Building in Web3
Marketing and Community Building in Web3
Federico Ast14 views
The Dark Web : Hidden Services by Anshu Singh
The Dark Web : Hidden ServicesThe Dark Web : Hidden Services
The Dark Web : Hidden Services
Anshu Singh14 views

[Lithuania] Introduction to threat modeling