SlideShare a Scribd company logo
LONDON 18-19 OCT 2018
Threat Modeling at
Speed & Scale
Stuart Winter-Tear
LONDON 18-19 OCT 2018
ABOUT ME
- Secure Design Analyst @ Continuum Security
- @stegopax
- Infosec “Generalist”
- Try to think of something interesting to put here…..
LONDON 18-19 OCT 2018
I read a
book…..
LONDON 18-19 OCT 2018
Tell stories…..
LONDON 18-19 OCT 2018
They won’t
remember
anything
anyway…..
LONDON 18-19 OCT 2018
LONDON 18-19 OCT 2018
LONDON 18-19 OCT 2018
LONDON 18-19 OCT 2018
Honestly
Guv...
LONDON 18-19 OCT 2018
And then I discovered evil brainstorming…...
LONDON 18-19 OCT 2018
What is threat modeling? General Methodology.
What are we building?
What can go wrong?
What are we going to do about it?
Did we do a good job?
LONDON 18-19 OCT 2018
Secure Design!
LONDON 18-19 OCT 2018
Why do threat modeling?
Because it is far more costly fixing stuff after the fact.
Shift Security Left.
LONDON 18-19 OCT 2018
So why aren’t we threat modelling?
Because we’ve always done it a certain way in security -
like conference talks with Powerpoint…..
LONDON 18-19 OCT 2018
Well not quite…..
The manual method of threat modeling is slow work.
LONDON 18-19 OCT 2018
The Problems (1) - Skill Intensive
Security
Architecture
Business Analyst
Developers
LONDON 18-19 OCT 2018
The Problems (2) - Time
LONDON 18-19 OCT 2018
The Problems (3) - Consistency
Not all threat models are created equal.
LONDON 18-19 OCT 2018
The Rubber Meets the Road - Manual Threat Modeling:
Is slow
Doesn’t scale
Isn’t Systematic
Becomes a bottleneck
Gets left behind
LONDON 18-19 OCT 2018
Brutal Honesty.
Manual forms of threat modeling don’t play well in a fast-
paced devops environment.
LONDON 18-19 OCT 2018
So What Can We Do About This Problem?
LONDON 18-19 OCT 2018
Manual Threat Modeling
LONDON 18-19 OCT 2018
Automated Threat Modeling
LONDON 18-19 OCT 2018
Manual Threat
Modeling
Threat
modeling with
Templates &
Patterns
LONDON 18-19 OCT 2018
My Son is a Lego Genius!
LONDON 18-19 OCT 2018
The Security Community Has Already Recognised This.
OWASP ASVS V2 Authentication:
Security Verification Requirement 2.16
“Verify that all application data is transmitted over an
encrypted channel”
LONDON 18-19 OCT 2018
The Security Community Has Already Recognised This.
OWASP ASVS V2 Authentication:
What are we going to do about it (shortcut)
Security Verification Requirement 2.16
“Verify that all application data is transmitted over an
encrypted channel”
LONDON 18-19 OCT 2018
Great Let’s Use Security Standards!
LONDON 18-19 OCT 2018
Option 1:
Fork ASVS and create a template.
LONDON 18-19 OCT 2018
Option 1:
Fork ASVS and create a template.
Pros: You’re prescriptive during design
LONDON 18-19 OCT 2018
Option 1:
Fork ASVS and create a template.
Pros: You’re prescriptive during design
Cons: You’re prescriptive during design
LONDON 18-19 OCT 2018
Option 1: Remember this?
Security Verification Requirement 2.16
“Verify that all application data is transmitted over an
encrypted channel”
LONDON 18-19 OCT 2018
Option 1: Remember this?
Security Verification Requirement 2.16
“Verify that all application data is transmitted over an
encrypted channel”
We can infer a threat model
LONDON 18-19 OCT 2018
Option 1: Remember this?
Security Verification Requirement 2.16
“Verify that all application data is transmitted over an
encrypted channel”
We can infer a threat model
Threat: Attackers could gain access to sensitive data in transit
LONDON 18-19 OCT 2018
What is threat modeling? General Methodology.
What are we building?
What can go wrong?
What are we going to do about it?
Did we do a good job?
LONDON 18-19 OCT 2018
Option 1: How Do We Communicate?
Excel
Confluence
BDD Stories
?????
LONDON 18-19 OCT 2018
Option 1: How Do We Communicate?
LONDON 18-19 OCT 2018
Option 1: How Do We Communicate?
Excel
Confluence
BDD Stories
?????
Communicate in their language!
LONDON 18-19 OCT 2018
Option 1:
Fork ASVS.
Pros: You’re prescriptive during design
Cons: It’s still one-size-fits-all
LONDON 18-19 OCT 2018
Problems with
one-size-fits-all
approach
LONDON 18-19 OCT 2018
Problems with
one-size-fits-all
approach
LONDON 18-19 OCT 2018
Option 2: Risk
Patterns.
Architectural
Component
Threat
Modeling
LONDON 18-19 OCT 2018
LONDON 18-19 OCT 2018
LONDON 18-19 OCT 2018
LONDON 18-19 OCT 2018
What is threat modeling? General Methodology.
What are we building?
What can go wrong?
What are we going to do about it?
Did we do a good job?
LONDON 18-19 OCT 2018
GoSDL - Slack
LONDON 18-19 OCT 2018
LONDON 18-19 OCT 2018
Software Development Principle: DRY
Don’t
Repeat
Yourself
LONDON 18-19 OCT 2018
Object
Oriented
Threat
Modeling
LONDON 18-19 OCT 2018
Inheritance
Example in
JBoss Drools
LONDON 18-19 OCT 2018
Inheritance &
Overloading
Methods
LONDON 18-19 OCT 2018
LONDON 18-19 OCT 2018
Jboss Drools
Example.
LONDON 18-19 OCT 2018
Disadvantages
Checklists shortcut thinking.
Garbage in garbage out
No data-flows or trust boundaries.
LONDON 18-19 OCT 2018
Advantages
Speed & Scale
Consistency
Self-service
Knowledge base.
More time for the hard stuff
LONDON 18-19 OCT 2018
LONDON 18-19 OCT 2018
LONDON 18-19 OCT 2018
And That’s the Key!
Hopefully 3 things you’ll still remember in 30 minutes:
a) Threat modeling is awesome
b) We can automate much of it.
c) Architectural component based threat modeling.
LONDON 18-19 OCT 2018
Questions?
LONDON 18-19 OCT 2018
Thank you!
@stegopax
Continuum Security
@continuumsecure
LONDON 18-19 OCT 2018
Extra Material - Threat Modeling “as-code”
ThreatSpec - Fraser Scott @zeroXten
ThreatPlayBook - we45.com - Abhay Bhargav @abhaybhargav
PYTM - Izar Tarandach @izar_t
LONDON 18-19 OCT 2018
ThreatSpec
LONDON 18-19 OCT 2018
Threat
PlayBook
LONDON 18-19 OCT 2018

More Related Content

Similar to Threat modeling at speed & scale

Winners and Losers in Age of Automation
Winners and Losers in Age of AutomationWinners and Losers in Age of Automation
Winners and Losers in Age of Automation
Mark Coopersmith
 
VSSML18. European Machine Learning Platform
VSSML18. European Machine Learning PlatformVSSML18. European Machine Learning Platform
VSSML18. European Machine Learning Platform
BigML, Inc
 
Chatbot & AI Conferences You Should Not Miss In Europe In 2019
Chatbot & AI Conferences You Should Not Miss In Europe In 2019Chatbot & AI Conferences You Should Not Miss In Europe In 2019
Chatbot & AI Conferences You Should Not Miss In Europe In 2019
Onlim GmbH
 
TfL - How GIS is Helping to Deliver Healthy Streets for Londoners - Enterpris...
TfL - How GIS is Helping to Deliver Healthy Streets for Londoners - Enterpris...TfL - How GIS is Helping to Deliver Healthy Streets for Londoners - Enterpris...
TfL - How GIS is Helping to Deliver Healthy Streets for Londoners - Enterpris...
Esri UK
 
WAC 2018 | BITS Pilani Hyderabad
WAC 2018 | BITS Pilani HyderabadWAC 2018 | BITS Pilani Hyderabad
WAC 2018 | BITS Pilani Hyderabad
What After College
 
Alessandro Terenzi (Inglobe Technologies) Developing AR Apps with the ARMedia...
Alessandro Terenzi (Inglobe Technologies) Developing AR Apps with the ARMedia...Alessandro Terenzi (Inglobe Technologies) Developing AR Apps with the ARMedia...
Alessandro Terenzi (Inglobe Technologies) Developing AR Apps with the ARMedia...
AugmentedWorldExpo
 
Open Banking: Digital Identity as a Bank Strategy
Open Banking: Digital Identity as a Bank StrategyOpen Banking: Digital Identity as a Bank Strategy
Open Banking: Digital Identity as a Bank Strategy
David Birch
 
Michael Muzik (Lufthansa Systems Airline): The Future of Load Control: Bringi...
Michael Muzik (Lufthansa Systems Airline): The Future of Load Control: Bringi...Michael Muzik (Lufthansa Systems Airline): The Future of Load Control: Bringi...
Michael Muzik (Lufthansa Systems Airline): The Future of Load Control: Bringi...
AugmentedWorldExpo
 
Internet of Things the future is now - Frederic Lhostte
Internet of Things the future is now - Frederic LhostteInternet of Things the future is now - Frederic Lhostte
Internet of Things the future is now - Frederic Lhostte
NRB
 
Code mining : comment extraire et exploiter l’information détenue dans du cod...
Code mining : comment extraire et exploiter l’information détenue dans du cod...Code mining : comment extraire et exploiter l’information détenue dans du cod...
Code mining : comment extraire et exploiter l’information détenue dans du cod...
Margo
 
Uidp 20180404 v6
Uidp 20180404 v6Uidp 20180404 v6
Uidp 20180404 v6
ISSIP
 
Prescott Watson (Edgybees): From Playing Games to Saving Lives – AR for Drone...
Prescott Watson (Edgybees): From Playing Games to Saving Lives – AR for Drone...Prescott Watson (Edgybees): From Playing Games to Saving Lives – AR for Drone...
Prescott Watson (Edgybees): From Playing Games to Saving Lives – AR for Drone...
AugmentedWorldExpo
 
Social Connections 14 - You Get What You Give
Social Connections 14 - You Get What You GiveSocial Connections 14 - You Get What You Give
Social Connections 14 - You Get What You Give
panagenda
 
“IT Technology Trends in 2017… and Beyond”
“IT Technology Trends in 2017… and Beyond”“IT Technology Trends in 2017… and Beyond”
“IT Technology Trends in 2017… and Beyond”
diannepatricia
 
Germany 20180424 v8
Germany 20180424 v8Germany 20180424 v8
Germany 20180424 v8
ISSIP
 
The revolution will be collaborative
The revolution will be collaborativeThe revolution will be collaborative
The revolution will be collaborative
Ronan Berder
 
You Get What You Give
You Get What You GiveYou Get What You Give
You Get What You Give
LetsConnect
 
New Ways to Deliver Business Outcomes with INtelligent Workstream Collaboration
New Ways to Deliver Business Outcomes with INtelligent Workstream CollaborationNew Ways to Deliver Business Outcomes with INtelligent Workstream Collaboration
New Ways to Deliver Business Outcomes with INtelligent Workstream Collaboration
LetsConnect
 
Online Marketing Rockstars - State of the German Internet 2018
Online Marketing Rockstars - State of the German Internet 2018Online Marketing Rockstars - State of the German Internet 2018
Online Marketing Rockstars - State of the German Internet 2018
Online Marketing Rockstars
 
State of Live 2017/2018
State of Live 2017/2018State of Live 2017/2018
State of Live 2017/2018
Eric Janssen
 

Similar to Threat modeling at speed & scale (20)

Winners and Losers in Age of Automation
Winners and Losers in Age of AutomationWinners and Losers in Age of Automation
Winners and Losers in Age of Automation
 
VSSML18. European Machine Learning Platform
VSSML18. European Machine Learning PlatformVSSML18. European Machine Learning Platform
VSSML18. European Machine Learning Platform
 
Chatbot & AI Conferences You Should Not Miss In Europe In 2019
Chatbot & AI Conferences You Should Not Miss In Europe In 2019Chatbot & AI Conferences You Should Not Miss In Europe In 2019
Chatbot & AI Conferences You Should Not Miss In Europe In 2019
 
TfL - How GIS is Helping to Deliver Healthy Streets for Londoners - Enterpris...
TfL - How GIS is Helping to Deliver Healthy Streets for Londoners - Enterpris...TfL - How GIS is Helping to Deliver Healthy Streets for Londoners - Enterpris...
TfL - How GIS is Helping to Deliver Healthy Streets for Londoners - Enterpris...
 
WAC 2018 | BITS Pilani Hyderabad
WAC 2018 | BITS Pilani HyderabadWAC 2018 | BITS Pilani Hyderabad
WAC 2018 | BITS Pilani Hyderabad
 
Alessandro Terenzi (Inglobe Technologies) Developing AR Apps with the ARMedia...
Alessandro Terenzi (Inglobe Technologies) Developing AR Apps with the ARMedia...Alessandro Terenzi (Inglobe Technologies) Developing AR Apps with the ARMedia...
Alessandro Terenzi (Inglobe Technologies) Developing AR Apps with the ARMedia...
 
Open Banking: Digital Identity as a Bank Strategy
Open Banking: Digital Identity as a Bank StrategyOpen Banking: Digital Identity as a Bank Strategy
Open Banking: Digital Identity as a Bank Strategy
 
Michael Muzik (Lufthansa Systems Airline): The Future of Load Control: Bringi...
Michael Muzik (Lufthansa Systems Airline): The Future of Load Control: Bringi...Michael Muzik (Lufthansa Systems Airline): The Future of Load Control: Bringi...
Michael Muzik (Lufthansa Systems Airline): The Future of Load Control: Bringi...
 
Internet of Things the future is now - Frederic Lhostte
Internet of Things the future is now - Frederic LhostteInternet of Things the future is now - Frederic Lhostte
Internet of Things the future is now - Frederic Lhostte
 
Code mining : comment extraire et exploiter l’information détenue dans du cod...
Code mining : comment extraire et exploiter l’information détenue dans du cod...Code mining : comment extraire et exploiter l’information détenue dans du cod...
Code mining : comment extraire et exploiter l’information détenue dans du cod...
 
Uidp 20180404 v6
Uidp 20180404 v6Uidp 20180404 v6
Uidp 20180404 v6
 
Prescott Watson (Edgybees): From Playing Games to Saving Lives – AR for Drone...
Prescott Watson (Edgybees): From Playing Games to Saving Lives – AR for Drone...Prescott Watson (Edgybees): From Playing Games to Saving Lives – AR for Drone...
Prescott Watson (Edgybees): From Playing Games to Saving Lives – AR for Drone...
 
Social Connections 14 - You Get What You Give
Social Connections 14 - You Get What You GiveSocial Connections 14 - You Get What You Give
Social Connections 14 - You Get What You Give
 
“IT Technology Trends in 2017… and Beyond”
“IT Technology Trends in 2017… and Beyond”“IT Technology Trends in 2017… and Beyond”
“IT Technology Trends in 2017… and Beyond”
 
Germany 20180424 v8
Germany 20180424 v8Germany 20180424 v8
Germany 20180424 v8
 
The revolution will be collaborative
The revolution will be collaborativeThe revolution will be collaborative
The revolution will be collaborative
 
You Get What You Give
You Get What You GiveYou Get What You Give
You Get What You Give
 
New Ways to Deliver Business Outcomes with INtelligent Workstream Collaboration
New Ways to Deliver Business Outcomes with INtelligent Workstream CollaborationNew Ways to Deliver Business Outcomes with INtelligent Workstream Collaboration
New Ways to Deliver Business Outcomes with INtelligent Workstream Collaboration
 
Online Marketing Rockstars - State of the German Internet 2018
Online Marketing Rockstars - State of the German Internet 2018Online Marketing Rockstars - State of the German Internet 2018
Online Marketing Rockstars - State of the German Internet 2018
 
State of Live 2017/2018
State of Live 2017/2018State of Live 2017/2018
State of Live 2017/2018
 

Recently uploaded

PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
Ralf Eggert
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
RinaMondal9
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
Elena Simperl
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
Product School
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Thierry Lestable
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfSAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
Peter Spielvogel
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
Dorra BARTAGUIZ
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Nexer Digital
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
nkrafacyberclub
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 

Recently uploaded (20)

PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfSAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 

Threat modeling at speed & scale

  • 1. LONDON 18-19 OCT 2018 Threat Modeling at Speed & Scale Stuart Winter-Tear
  • 2. LONDON 18-19 OCT 2018 ABOUT ME - Secure Design Analyst @ Continuum Security - @stegopax - Infosec “Generalist” - Try to think of something interesting to put here…..
  • 3. LONDON 18-19 OCT 2018 I read a book…..
  • 4. LONDON 18-19 OCT 2018 Tell stories…..
  • 5. LONDON 18-19 OCT 2018 They won’t remember anything anyway…..
  • 9. LONDON 18-19 OCT 2018 Honestly Guv...
  • 10. LONDON 18-19 OCT 2018 And then I discovered evil brainstorming…...
  • 11. LONDON 18-19 OCT 2018 What is threat modeling? General Methodology. What are we building? What can go wrong? What are we going to do about it? Did we do a good job?
  • 12. LONDON 18-19 OCT 2018 Secure Design!
  • 13. LONDON 18-19 OCT 2018 Why do threat modeling? Because it is far more costly fixing stuff after the fact. Shift Security Left.
  • 14. LONDON 18-19 OCT 2018 So why aren’t we threat modelling? Because we’ve always done it a certain way in security - like conference talks with Powerpoint…..
  • 15. LONDON 18-19 OCT 2018 Well not quite….. The manual method of threat modeling is slow work.
  • 16. LONDON 18-19 OCT 2018 The Problems (1) - Skill Intensive Security Architecture Business Analyst Developers
  • 17. LONDON 18-19 OCT 2018 The Problems (2) - Time
  • 18. LONDON 18-19 OCT 2018 The Problems (3) - Consistency Not all threat models are created equal.
  • 19. LONDON 18-19 OCT 2018 The Rubber Meets the Road - Manual Threat Modeling: Is slow Doesn’t scale Isn’t Systematic Becomes a bottleneck Gets left behind
  • 20. LONDON 18-19 OCT 2018 Brutal Honesty. Manual forms of threat modeling don’t play well in a fast- paced devops environment.
  • 21. LONDON 18-19 OCT 2018 So What Can We Do About This Problem?
  • 22. LONDON 18-19 OCT 2018 Manual Threat Modeling
  • 23. LONDON 18-19 OCT 2018 Automated Threat Modeling
  • 24. LONDON 18-19 OCT 2018 Manual Threat Modeling Threat modeling with Templates & Patterns
  • 25. LONDON 18-19 OCT 2018 My Son is a Lego Genius!
  • 26. LONDON 18-19 OCT 2018 The Security Community Has Already Recognised This. OWASP ASVS V2 Authentication: Security Verification Requirement 2.16 “Verify that all application data is transmitted over an encrypted channel”
  • 27. LONDON 18-19 OCT 2018 The Security Community Has Already Recognised This. OWASP ASVS V2 Authentication: What are we going to do about it (shortcut) Security Verification Requirement 2.16 “Verify that all application data is transmitted over an encrypted channel”
  • 28. LONDON 18-19 OCT 2018 Great Let’s Use Security Standards!
  • 29. LONDON 18-19 OCT 2018 Option 1: Fork ASVS and create a template.
  • 30. LONDON 18-19 OCT 2018 Option 1: Fork ASVS and create a template. Pros: You’re prescriptive during design
  • 31. LONDON 18-19 OCT 2018 Option 1: Fork ASVS and create a template. Pros: You’re prescriptive during design Cons: You’re prescriptive during design
  • 32. LONDON 18-19 OCT 2018 Option 1: Remember this? Security Verification Requirement 2.16 “Verify that all application data is transmitted over an encrypted channel”
  • 33. LONDON 18-19 OCT 2018 Option 1: Remember this? Security Verification Requirement 2.16 “Verify that all application data is transmitted over an encrypted channel” We can infer a threat model
  • 34. LONDON 18-19 OCT 2018 Option 1: Remember this? Security Verification Requirement 2.16 “Verify that all application data is transmitted over an encrypted channel” We can infer a threat model Threat: Attackers could gain access to sensitive data in transit
  • 35. LONDON 18-19 OCT 2018 What is threat modeling? General Methodology. What are we building? What can go wrong? What are we going to do about it? Did we do a good job?
  • 36. LONDON 18-19 OCT 2018 Option 1: How Do We Communicate? Excel Confluence BDD Stories ?????
  • 37. LONDON 18-19 OCT 2018 Option 1: How Do We Communicate?
  • 38. LONDON 18-19 OCT 2018 Option 1: How Do We Communicate? Excel Confluence BDD Stories ????? Communicate in their language!
  • 39. LONDON 18-19 OCT 2018 Option 1: Fork ASVS. Pros: You’re prescriptive during design Cons: It’s still one-size-fits-all
  • 40. LONDON 18-19 OCT 2018 Problems with one-size-fits-all approach
  • 41. LONDON 18-19 OCT 2018 Problems with one-size-fits-all approach
  • 42. LONDON 18-19 OCT 2018 Option 2: Risk Patterns. Architectural Component Threat Modeling
  • 46. LONDON 18-19 OCT 2018 What is threat modeling? General Methodology. What are we building? What can go wrong? What are we going to do about it? Did we do a good job?
  • 47. LONDON 18-19 OCT 2018 GoSDL - Slack
  • 49. LONDON 18-19 OCT 2018 Software Development Principle: DRY Don’t Repeat Yourself
  • 50. LONDON 18-19 OCT 2018 Object Oriented Threat Modeling
  • 51. LONDON 18-19 OCT 2018 Inheritance Example in JBoss Drools
  • 52. LONDON 18-19 OCT 2018 Inheritance & Overloading Methods
  • 54. LONDON 18-19 OCT 2018 Jboss Drools Example.
  • 55. LONDON 18-19 OCT 2018 Disadvantages Checklists shortcut thinking. Garbage in garbage out No data-flows or trust boundaries.
  • 56. LONDON 18-19 OCT 2018 Advantages Speed & Scale Consistency Self-service Knowledge base. More time for the hard stuff
  • 59. LONDON 18-19 OCT 2018 And That’s the Key! Hopefully 3 things you’ll still remember in 30 minutes: a) Threat modeling is awesome b) We can automate much of it. c) Architectural component based threat modeling.
  • 60. LONDON 18-19 OCT 2018 Questions?
  • 61. LONDON 18-19 OCT 2018 Thank you! @stegopax Continuum Security @continuumsecure
  • 62. LONDON 18-19 OCT 2018 Extra Material - Threat Modeling “as-code” ThreatSpec - Fraser Scott @zeroXten ThreatPlayBook - we45.com - Abhay Bhargav @abhaybhargav PYTM - Izar Tarandach @izar_t
  • 63. LONDON 18-19 OCT 2018 ThreatSpec
  • 64. LONDON 18-19 OCT 2018 Threat PlayBook