SlideShare a Scribd company logo
Threat Modeling
Lessons from
Star Wars
Adam Shostack
Presented
Nov 2021
About Adam Shostack
Why Are We Here Today?
• Engineer more secure systems
• Structured, systematic and comprehensive approach
• Engineer a consistent & predictable lack of surprise
• Works for you (as people, organization and ecosystem)
What Is Threat
Modeling?
Agenda
A simple approach to threat modeling
Top 10 lessons
Some history +
A simple approach to
threat modeling
4 Question Framework
Web App
Customer
DB
Our App
Content
creation
What Are We Working On?
What Are We Working On?
Data Flow Diagram example
What Can Go Wrong?
Remember STRIDE
Spoofing
By Lego Envy, http://www.eurobricks.com/forum/index.php?showtopic=64532
Tampering
ttp://pinlac.com/LegoDSTractorBeam.html
By Seb H flickr.com/photos/88048956@N04/8531040850/
Repudiation
Information Disclosure
Photo by Simon Liu flickr.com/photos/si-mocs/6999508124/
Information Disclosure (and consequences)
Denial of Service
Model by Nathan Sawaya
http://brickartist.com/gallery/han-solo-in-
Elevation of Privilege
flickr.com/photos/prodiffusion/
STRIDE Mnemonic
• STRIDE helps you remember:
Spoofing
Tampering
Repudiation
Information Disclosure
Denial of Service
Elevation of Privileges
Help us be structured in how we think about threats
https://shostack.org/training/courses/linkedin
4 Questions
What Are We Going To Do About It?
Threat Property Mitigation approach
Spoofing Authentication  Passwords, multi-factor authN
 Digital signatures
Tampering Integrity  Permissions/ACLs
 Digital signatures
Repudiation Non-Repudiation
(Accountability)
 Secure logging and auditing
 Digital Signatures
Information Disclosure Confidentiality  Encryption
 Permissions/ACLS
Denial of Service Availability  Permissions/ACLs
 Filtering
 Quotas
Elevation of privilege Authorization  Permissions/ACLs
 Input validation
Top Ten Lessons
Trap #1: “Search your feelings!”
• “Think Like An Attacker”
• Serious work is helped by structure
Fix
Trap
#2: “You’re Never Done Threat Modeling”
Model
Identify
Threats
Mitigate
Validate
Model
Identify
Threats
Mitigate
Validate
Trap #3: “The Way To Threat Model Is…”
• Too much focus on specifics of how
Use this framework (STRIDE)
With this diagram type
• Focus on helping people find good threats
• Focus on different skills, systems
Developers
Operations
Fix
Trap
Trap #3: Monolithic Processes
Model
Identify
Threats
Mitigate
Validate
Trap Fix: Building blocks
Security mavens Experts in other areas
Trap #3: “The Way To Threat Model Is…”
Software
Systems
Trap #4: Threat Modeling as One Skill
• “I should learn to threat model”
• Think of threat modeling
Like software development
Techniques & repertoire
• Technique: DFDs, STRIDE, Attack trees
• Repertoire:
Tools: Firesheep, Hydra, Kali
Books: Cuckoo's Egg to Countdown to Zero Day
• All used to analogize & reason about new systems
Trap
Fix
Trap #5: “Threat Modeling is Easy”
• Thinking your first threat model will be easy
• “Driving is easy”
• Once you learn
• 40,000 US deaths per year
• Plan to work, build muscle
Trap
Fix
Trap #6: Threat Modeling is for Specialists
• Thinking TM is for specialists
• Make it like version control:
Every developer, most sysadmins know some
Some orgs have full time people managing trees
• This is a stretch goal for threat modeling
Trap
Fix
Trap #7: The Wrong Focus
• Start from your assets
• Start by thinking about your attackers
• Threat modeling should focus on finding threats
• Remember trap #3: “The way to threat model is”
• Starting from assets or attackers work for some people
Trap
Fix
Trap #8: Straining Against The Supply Chain
• Trying to do it all
Cost & feasibility of fixes changes
Threats are “easy” to address at different parts
o SoC chipmaker can ship trusted boot
o Library developers can add logging, not see onsite logs
• Think about an alliance along your supply chain
Shared responsibility models
Non-requirements
Trap
Fix
Threats need mitigation
Mitigations can be bypassed
Requirements
Threats Mitigations
Requirements drive threats
Threats drive requirements
No mitigation?
Simplify requirements
Trap #9: Laser-Like Focus on Threats
Interplay of attacks, mitigations and requirements
Trap #10: Threat Model at the Wrong Time
“Sir, we’ve analyzed their
attack pattern, and …
there is a danger”
Summary
• Anyone can threat model, and everyone should…soon!
• The skills, techniques and repertoire can all be learned
• There are many traps
• Threat modeling can be the most effective way to drive
security through your product, service or system
“All models are wrong,
some models are useful”
Thank you!
Resources
• Threatmodelingmanifesto.org
• shostack.org /resources/ + /blog
• shostack.org/training/
• adam@shostack.org
Questions?
Thank you!
• Star Wars: Episodes IV-VI
• Great Creative Commons Lego brick art:
Lego Envy, http://www.eurobricks.com/forum/index.php?showtopic=64532
http://pinlac.com/LegoDSTractorBeam.html
Seb H http://www.flickr.com/photos/88048956@N04/8531040850/
Simon Liu http://www.flickr.com/photos/si-mocs/6999508124/
Kaitan Tylerguy http://www.flickr.com/photos/kaitan/3326772088/
Nathan Sawaya, http://brickartist.com/gallery/han-solo-in-carbonite/
http://www.flickr.com/photos/prodiffusion/
Threat Modeling Lessons From Star Wars
Threat Modeling Lessons From Star Wars

More Related Content

What's hot

Detection Rules Coverage
Detection Rules CoverageDetection Rules Coverage
Detection Rules Coverage
Sunny Neo
 
Understanding Application Threat Modelling & Architecture
 Understanding Application Threat Modelling & Architecture Understanding Application Threat Modelling & Architecture
Understanding Application Threat Modelling & Architecture
Priyanka Aash
 
Cyber Threat Modeling
Cyber Threat ModelingCyber Threat Modeling
Cyber Threat Modeling
EC-Council
 
Secure Software Development Lifecycle
Secure Software Development LifecycleSecure Software Development Lifecycle
Secure Software Development Lifecycle
1&1
 
Risk Analysis Of Banking Malware Attacks
Risk Analysis Of Banking Malware AttacksRisk Analysis Of Banking Malware Attacks
Risk Analysis Of Banking Malware Attacks
Marco Morana
 
Secure Coding and Threat Modeling
Secure Coding and Threat ModelingSecure Coding and Threat Modeling
Secure Coding and Threat Modeling
Miriam Celi, CISSP, GISP, MSCS, MBA
 
SOC: Use cases and are we asking the right questions?
SOC: Use cases and are we asking the right questions?SOC: Use cases and are we asking the right questions?
SOC: Use cases and are we asking the right questions?
Jonathan Sinclair
 
O'Reilly SACon 2019 - (Continuous) Threat Modeling - What works?
O'Reilly SACon 2019 - (Continuous) Threat Modeling - What works?O'Reilly SACon 2019 - (Continuous) Threat Modeling - What works?
O'Reilly SACon 2019 - (Continuous) Threat Modeling - What works?
Izar Tarandach
 
CISSP 8 Domains.pdf
CISSP 8 Domains.pdfCISSP 8 Domains.pdf
CISSP 8 Domains.pdf
dotco
 
How to implement NIST cybersecurity standards in my organization
How to implement NIST cybersecurity standards in my organizationHow to implement NIST cybersecurity standards in my organization
How to implement NIST cybersecurity standards in my organization
Exigent Technologies LLC
 
Next-Gen security operation center
Next-Gen security operation centerNext-Gen security operation center
Next-Gen security operation center
Muhammad Sahputra
 
Secure SDLC Framework
Secure SDLC FrameworkSecure SDLC Framework
Secure SDLC Framework
Rishi Kant
 
Security in the Software Development Life Cycle (SDLC)
Security in the Software Development Life Cycle (SDLC)Security in the Software Development Life Cycle (SDLC)
Security in the Software Development Life Cycle (SDLC)
Frances Coronel
 
VAPT - Vulnerability Assessment & Penetration Testing
VAPT - Vulnerability Assessment & Penetration Testing VAPT - Vulnerability Assessment & Penetration Testing
VAPT - Vulnerability Assessment & Penetration Testing
Netpluz Asia Pte Ltd
 
Real World Application Threat Modelling By Example
Real World Application Threat Modelling By ExampleReal World Application Threat Modelling By Example
Real World Application Threat Modelling By Example
NCC Group
 
Security Operation Center - Design & Build
Security Operation Center - Design & BuildSecurity Operation Center - Design & Build
Security Operation Center - Design & Build
Sameer Paradia
 
Threat Modeling Using STRIDE
Threat Modeling Using STRIDEThreat Modeling Using STRIDE
Threat Modeling Using STRIDE
Girindro Pringgo Digdo
 
Secure coding practices
Secure coding practicesSecure coding practices
Secure coding practices
Scott Hurrey
 
Threat modelling(system + enterprise)
Threat modelling(system + enterprise)Threat modelling(system + enterprise)
Threat modelling(system + enterprise)
abhimanyubhogwan
 
"Threat Model Every Story": Practical Continuous Threat Modeling Work for You...
"Threat Model Every Story": Practical Continuous Threat Modeling Work for You..."Threat Model Every Story": Practical Continuous Threat Modeling Work for You...
"Threat Model Every Story": Practical Continuous Threat Modeling Work for You...
Izar Tarandach
 

What's hot (20)

Detection Rules Coverage
Detection Rules CoverageDetection Rules Coverage
Detection Rules Coverage
 
Understanding Application Threat Modelling & Architecture
 Understanding Application Threat Modelling & Architecture Understanding Application Threat Modelling & Architecture
Understanding Application Threat Modelling & Architecture
 
Cyber Threat Modeling
Cyber Threat ModelingCyber Threat Modeling
Cyber Threat Modeling
 
Secure Software Development Lifecycle
Secure Software Development LifecycleSecure Software Development Lifecycle
Secure Software Development Lifecycle
 
Risk Analysis Of Banking Malware Attacks
Risk Analysis Of Banking Malware AttacksRisk Analysis Of Banking Malware Attacks
Risk Analysis Of Banking Malware Attacks
 
Secure Coding and Threat Modeling
Secure Coding and Threat ModelingSecure Coding and Threat Modeling
Secure Coding and Threat Modeling
 
SOC: Use cases and are we asking the right questions?
SOC: Use cases and are we asking the right questions?SOC: Use cases and are we asking the right questions?
SOC: Use cases and are we asking the right questions?
 
O'Reilly SACon 2019 - (Continuous) Threat Modeling - What works?
O'Reilly SACon 2019 - (Continuous) Threat Modeling - What works?O'Reilly SACon 2019 - (Continuous) Threat Modeling - What works?
O'Reilly SACon 2019 - (Continuous) Threat Modeling - What works?
 
CISSP 8 Domains.pdf
CISSP 8 Domains.pdfCISSP 8 Domains.pdf
CISSP 8 Domains.pdf
 
How to implement NIST cybersecurity standards in my organization
How to implement NIST cybersecurity standards in my organizationHow to implement NIST cybersecurity standards in my organization
How to implement NIST cybersecurity standards in my organization
 
Next-Gen security operation center
Next-Gen security operation centerNext-Gen security operation center
Next-Gen security operation center
 
Secure SDLC Framework
Secure SDLC FrameworkSecure SDLC Framework
Secure SDLC Framework
 
Security in the Software Development Life Cycle (SDLC)
Security in the Software Development Life Cycle (SDLC)Security in the Software Development Life Cycle (SDLC)
Security in the Software Development Life Cycle (SDLC)
 
VAPT - Vulnerability Assessment & Penetration Testing
VAPT - Vulnerability Assessment & Penetration Testing VAPT - Vulnerability Assessment & Penetration Testing
VAPT - Vulnerability Assessment & Penetration Testing
 
Real World Application Threat Modelling By Example
Real World Application Threat Modelling By ExampleReal World Application Threat Modelling By Example
Real World Application Threat Modelling By Example
 
Security Operation Center - Design & Build
Security Operation Center - Design & BuildSecurity Operation Center - Design & Build
Security Operation Center - Design & Build
 
Threat Modeling Using STRIDE
Threat Modeling Using STRIDEThreat Modeling Using STRIDE
Threat Modeling Using STRIDE
 
Secure coding practices
Secure coding practicesSecure coding practices
Secure coding practices
 
Threat modelling(system + enterprise)
Threat modelling(system + enterprise)Threat modelling(system + enterprise)
Threat modelling(system + enterprise)
 
"Threat Model Every Story": Practical Continuous Threat Modeling Work for You...
"Threat Model Every Story": Practical Continuous Threat Modeling Work for You..."Threat Model Every Story": Practical Continuous Threat Modeling Work for You...
"Threat Model Every Story": Practical Continuous Threat Modeling Work for You...
 

Similar to Threat Modeling Lessons From Star Wars

Threat Modeling Lessons from Star Wars
Threat Modeling Lessons from Star WarsThreat Modeling Lessons from Star Wars
Threat Modeling Lessons from Star Wars
Adam Shostack
 
bsides NOVA 2017 So You Want to Be a Cyber Threat Analyst eh?
bsides NOVA 2017 So You Want to Be a Cyber Threat Analyst eh?bsides NOVA 2017 So You Want to Be a Cyber Threat Analyst eh?
bsides NOVA 2017 So You Want to Be a Cyber Threat Analyst eh?
Anthony Melfi
 
Defending Enterprise IT - beating assymetricality
Defending Enterprise IT - beating assymetricalityDefending Enterprise IT - beating assymetricality
Defending Enterprise IT - beating assymetricality
Claus Cramon Houmann
 
Threat Modeling - Locking the Door to Vulnerabilities
Threat Modeling - Locking the Door to VulnerabilitiesThreat Modeling - Locking the Door to Vulnerabilities
Threat Modeling - Locking the Door to Vulnerabilities
Security Innovation
 
Threat Modeling: Applied on a Publish-Subscribe Architectural Style
Threat Modeling: Applied on a Publish-Subscribe Architectural StyleThreat Modeling: Applied on a Publish-Subscribe Architectural Style
Threat Modeling: Applied on a Publish-Subscribe Architectural Style
Dharmalingam Ganesan
 
Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)
Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)
Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)
Mark Simos
 
Presentation infra and_datacentrre_dialogue_v2
Presentation infra and_datacentrre_dialogue_v2Presentation infra and_datacentrre_dialogue_v2
Presentation infra and_datacentrre_dialogue_v2
Claus Cramon Houmann
 
Threat Modeling to Reduce Software Security Risk
Threat Modeling to Reduce Software Security RiskThreat Modeling to Reduce Software Security Risk
Threat Modeling to Reduce Software Security Risk
Security Innovation
 
DevSecCon Tel Aviv 2018 - Value driven threat modeling by Avi Douglen
DevSecCon Tel Aviv 2018 - Value driven threat modeling by Avi DouglenDevSecCon Tel Aviv 2018 - Value driven threat modeling by Avi Douglen
DevSecCon Tel Aviv 2018 - Value driven threat modeling by Avi Douglen
DevSecCon
 
System Security Beyond the Libraries
System Security Beyond the LibrariesSystem Security Beyond the Libraries
System Security Beyond the Libraries
Eoin Woods
 
Value-driven threat modeling: Security by design - Avi Douglen - DevOpsDays T...
Value-driven threat modeling: Security by design - Avi Douglen - DevOpsDays T...Value-driven threat modeling: Security by design - Avi Douglen - DevOpsDays T...
Value-driven threat modeling: Security by design - Avi Douglen - DevOpsDays T...
DevOpsDays Tel Aviv
 
DevSecOps at Agile 2019
DevSecOps at   Agile 2019 DevSecOps at   Agile 2019
DevSecOps at Agile 2019
Elizabeth Ayer
 
Securing the “Weakest Link”
Securing the “Weakest Link”Securing the “Weakest Link”
Securing the “Weakest Link”
Priyanka Aash
 
Threat Modeling workshop by Robert Hurlbut
Threat Modeling workshop by Robert HurlbutThreat Modeling workshop by Robert Hurlbut
Threat Modeling workshop by Robert Hurlbut
DevSecCon
 
Threat Modeling in the Cloud
Threat Modeling in the CloudThreat Modeling in the Cloud
Threat Modeling in the Cloud
Paige Cruz
 
Using threat models to control project brief
Using threat models to control project briefUsing threat models to control project brief
Using threat models to control project brief
Dinis Cruz
 
OWASP SB -Threat modeling 101
OWASP SB -Threat modeling 101OWASP SB -Threat modeling 101
OWASP SB -Threat modeling 101
Jozsef Ottucsak
 
Threat Modelling in DevSecOps Cultures
Threat Modelling in DevSecOps CulturesThreat Modelling in DevSecOps Cultures
Threat Modelling in DevSecOps Cultures
DevOps Indonesia
 
Blackhat 2014 Conference and Defcon 22
Blackhat 2014 Conference and Defcon 22 Blackhat 2014 Conference and Defcon 22
Blackhat 2014 Conference and Defcon 22
dandb-technology
 
ISACA Ethical Hacking Presentation 10/2011
ISACA Ethical Hacking Presentation 10/2011ISACA Ethical Hacking Presentation 10/2011
ISACA Ethical Hacking Presentation 10/2011
Xavier Mertens
 

Similar to Threat Modeling Lessons From Star Wars (20)

Threat Modeling Lessons from Star Wars
Threat Modeling Lessons from Star WarsThreat Modeling Lessons from Star Wars
Threat Modeling Lessons from Star Wars
 
bsides NOVA 2017 So You Want to Be a Cyber Threat Analyst eh?
bsides NOVA 2017 So You Want to Be a Cyber Threat Analyst eh?bsides NOVA 2017 So You Want to Be a Cyber Threat Analyst eh?
bsides NOVA 2017 So You Want to Be a Cyber Threat Analyst eh?
 
Defending Enterprise IT - beating assymetricality
Defending Enterprise IT - beating assymetricalityDefending Enterprise IT - beating assymetricality
Defending Enterprise IT - beating assymetricality
 
Threat Modeling - Locking the Door to Vulnerabilities
Threat Modeling - Locking the Door to VulnerabilitiesThreat Modeling - Locking the Door to Vulnerabilities
Threat Modeling - Locking the Door to Vulnerabilities
 
Threat Modeling: Applied on a Publish-Subscribe Architectural Style
Threat Modeling: Applied on a Publish-Subscribe Architectural StyleThreat Modeling: Applied on a Publish-Subscribe Architectural Style
Threat Modeling: Applied on a Publish-Subscribe Architectural Style
 
Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)
Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)
Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)
 
Presentation infra and_datacentrre_dialogue_v2
Presentation infra and_datacentrre_dialogue_v2Presentation infra and_datacentrre_dialogue_v2
Presentation infra and_datacentrre_dialogue_v2
 
Threat Modeling to Reduce Software Security Risk
Threat Modeling to Reduce Software Security RiskThreat Modeling to Reduce Software Security Risk
Threat Modeling to Reduce Software Security Risk
 
DevSecCon Tel Aviv 2018 - Value driven threat modeling by Avi Douglen
DevSecCon Tel Aviv 2018 - Value driven threat modeling by Avi DouglenDevSecCon Tel Aviv 2018 - Value driven threat modeling by Avi Douglen
DevSecCon Tel Aviv 2018 - Value driven threat modeling by Avi Douglen
 
System Security Beyond the Libraries
System Security Beyond the LibrariesSystem Security Beyond the Libraries
System Security Beyond the Libraries
 
Value-driven threat modeling: Security by design - Avi Douglen - DevOpsDays T...
Value-driven threat modeling: Security by design - Avi Douglen - DevOpsDays T...Value-driven threat modeling: Security by design - Avi Douglen - DevOpsDays T...
Value-driven threat modeling: Security by design - Avi Douglen - DevOpsDays T...
 
DevSecOps at Agile 2019
DevSecOps at   Agile 2019 DevSecOps at   Agile 2019
DevSecOps at Agile 2019
 
Securing the “Weakest Link”
Securing the “Weakest Link”Securing the “Weakest Link”
Securing the “Weakest Link”
 
Threat Modeling workshop by Robert Hurlbut
Threat Modeling workshop by Robert HurlbutThreat Modeling workshop by Robert Hurlbut
Threat Modeling workshop by Robert Hurlbut
 
Threat Modeling in the Cloud
Threat Modeling in the CloudThreat Modeling in the Cloud
Threat Modeling in the Cloud
 
Using threat models to control project brief
Using threat models to control project briefUsing threat models to control project brief
Using threat models to control project brief
 
OWASP SB -Threat modeling 101
OWASP SB -Threat modeling 101OWASP SB -Threat modeling 101
OWASP SB -Threat modeling 101
 
Threat Modelling in DevSecOps Cultures
Threat Modelling in DevSecOps CulturesThreat Modelling in DevSecOps Cultures
Threat Modelling in DevSecOps Cultures
 
Blackhat 2014 Conference and Defcon 22
Blackhat 2014 Conference and Defcon 22 Blackhat 2014 Conference and Defcon 22
Blackhat 2014 Conference and Defcon 22
 
ISACA Ethical Hacking Presentation 10/2011
ISACA Ethical Hacking Presentation 10/2011ISACA Ethical Hacking Presentation 10/2011
ISACA Ethical Hacking Presentation 10/2011
 

Recently uploaded

Enhancing Project Management Efficiency_ Leveraging AI Tools like ChatGPT.pdf
Enhancing Project Management Efficiency_ Leveraging AI Tools like ChatGPT.pdfEnhancing Project Management Efficiency_ Leveraging AI Tools like ChatGPT.pdf
Enhancing Project Management Efficiency_ Leveraging AI Tools like ChatGPT.pdf
Jay Das
 
Prosigns: Transforming Business with Tailored Technology Solutions
Prosigns: Transforming Business with Tailored Technology SolutionsProsigns: Transforming Business with Tailored Technology Solutions
Prosigns: Transforming Business with Tailored Technology Solutions
Prosigns
 
Cracking the code review at SpringIO 2024
Cracking the code review at SpringIO 2024Cracking the code review at SpringIO 2024
Cracking the code review at SpringIO 2024
Paco van Beckhoven
 
Innovating Inference - Remote Triggering of Large Language Models on HPC Clus...
Innovating Inference - Remote Triggering of Large Language Models on HPC Clus...Innovating Inference - Remote Triggering of Large Language Models on HPC Clus...
Innovating Inference - Remote Triggering of Large Language Models on HPC Clus...
Globus
 
Understanding Globus Data Transfers with NetSage
Understanding Globus Data Transfers with NetSageUnderstanding Globus Data Transfers with NetSage
Understanding Globus Data Transfers with NetSage
Globus
 
2024 RoOUG Security model for the cloud.pptx
2024 RoOUG Security model for the cloud.pptx2024 RoOUG Security model for the cloud.pptx
2024 RoOUG Security model for the cloud.pptx
Georgi Kodinov
 
Graphic Design Crash Course for beginners
Graphic Design Crash Course for beginnersGraphic Design Crash Course for beginners
Graphic Design Crash Course for beginners
e20449
 
Navigating the Metaverse: A Journey into Virtual Evolution"
Navigating the Metaverse: A Journey into Virtual Evolution"Navigating the Metaverse: A Journey into Virtual Evolution"
Navigating the Metaverse: A Journey into Virtual Evolution"
Donna Lenk
 
How to Position Your Globus Data Portal for Success Ten Good Practices
How to Position Your Globus Data Portal for Success Ten Good PracticesHow to Position Your Globus Data Portal for Success Ten Good Practices
How to Position Your Globus Data Portal for Success Ten Good Practices
Globus
 
Top Features to Include in Your Winzo Clone App for Business Growth (4).pptx
Top Features to Include in Your Winzo Clone App for Business Growth (4).pptxTop Features to Include in Your Winzo Clone App for Business Growth (4).pptx
Top Features to Include in Your Winzo Clone App for Business Growth (4).pptx
rickgrimesss22
 
How Recreation Management Software Can Streamline Your Operations.pptx
How Recreation Management Software Can Streamline Your Operations.pptxHow Recreation Management Software Can Streamline Your Operations.pptx
How Recreation Management Software Can Streamline Your Operations.pptx
wottaspaceseo
 
Using IESVE for Room Loads Analysis - Australia & New Zealand
Using IESVE for Room Loads Analysis - Australia & New ZealandUsing IESVE for Room Loads Analysis - Australia & New Zealand
Using IESVE for Room Loads Analysis - Australia & New Zealand
IES VE
 
Vitthal Shirke Microservices Resume Montevideo
Vitthal Shirke Microservices Resume MontevideoVitthal Shirke Microservices Resume Montevideo
Vitthal Shirke Microservices Resume Montevideo
Vitthal Shirke
 
Quarkus Hidden and Forbidden Extensions
Quarkus Hidden and Forbidden ExtensionsQuarkus Hidden and Forbidden Extensions
Quarkus Hidden and Forbidden Extensions
Max Andersen
 
A Comprehensive Look at Generative AI in Retail App Testing.pdf
A Comprehensive Look at Generative AI in Retail App Testing.pdfA Comprehensive Look at Generative AI in Retail App Testing.pdf
A Comprehensive Look at Generative AI in Retail App Testing.pdf
kalichargn70th171
 
Accelerate Enterprise Software Engineering with Platformless
Accelerate Enterprise Software Engineering with PlatformlessAccelerate Enterprise Software Engineering with Platformless
Accelerate Enterprise Software Engineering with Platformless
WSO2
 
Cyaniclab : Software Development Agency Portfolio.pdf
Cyaniclab : Software Development Agency Portfolio.pdfCyaniclab : Software Development Agency Portfolio.pdf
Cyaniclab : Software Development Agency Portfolio.pdf
Cyanic lab
 
Enhancing Research Orchestration Capabilities at ORNL.pdf
Enhancing Research Orchestration Capabilities at ORNL.pdfEnhancing Research Orchestration Capabilities at ORNL.pdf
Enhancing Research Orchestration Capabilities at ORNL.pdf
Globus
 
BoxLang: Review our Visionary Licenses of 2024
BoxLang: Review our Visionary Licenses of 2024BoxLang: Review our Visionary Licenses of 2024
BoxLang: Review our Visionary Licenses of 2024
Ortus Solutions, Corp
 
Globus Connect Server Deep Dive - GlobusWorld 2024
Globus Connect Server Deep Dive - GlobusWorld 2024Globus Connect Server Deep Dive - GlobusWorld 2024
Globus Connect Server Deep Dive - GlobusWorld 2024
Globus
 

Recently uploaded (20)

Enhancing Project Management Efficiency_ Leveraging AI Tools like ChatGPT.pdf
Enhancing Project Management Efficiency_ Leveraging AI Tools like ChatGPT.pdfEnhancing Project Management Efficiency_ Leveraging AI Tools like ChatGPT.pdf
Enhancing Project Management Efficiency_ Leveraging AI Tools like ChatGPT.pdf
 
Prosigns: Transforming Business with Tailored Technology Solutions
Prosigns: Transforming Business with Tailored Technology SolutionsProsigns: Transforming Business with Tailored Technology Solutions
Prosigns: Transforming Business with Tailored Technology Solutions
 
Cracking the code review at SpringIO 2024
Cracking the code review at SpringIO 2024Cracking the code review at SpringIO 2024
Cracking the code review at SpringIO 2024
 
Innovating Inference - Remote Triggering of Large Language Models on HPC Clus...
Innovating Inference - Remote Triggering of Large Language Models on HPC Clus...Innovating Inference - Remote Triggering of Large Language Models on HPC Clus...
Innovating Inference - Remote Triggering of Large Language Models on HPC Clus...
 
Understanding Globus Data Transfers with NetSage
Understanding Globus Data Transfers with NetSageUnderstanding Globus Data Transfers with NetSage
Understanding Globus Data Transfers with NetSage
 
2024 RoOUG Security model for the cloud.pptx
2024 RoOUG Security model for the cloud.pptx2024 RoOUG Security model for the cloud.pptx
2024 RoOUG Security model for the cloud.pptx
 
Graphic Design Crash Course for beginners
Graphic Design Crash Course for beginnersGraphic Design Crash Course for beginners
Graphic Design Crash Course for beginners
 
Navigating the Metaverse: A Journey into Virtual Evolution"
Navigating the Metaverse: A Journey into Virtual Evolution"Navigating the Metaverse: A Journey into Virtual Evolution"
Navigating the Metaverse: A Journey into Virtual Evolution"
 
How to Position Your Globus Data Portal for Success Ten Good Practices
How to Position Your Globus Data Portal for Success Ten Good PracticesHow to Position Your Globus Data Portal for Success Ten Good Practices
How to Position Your Globus Data Portal for Success Ten Good Practices
 
Top Features to Include in Your Winzo Clone App for Business Growth (4).pptx
Top Features to Include in Your Winzo Clone App for Business Growth (4).pptxTop Features to Include in Your Winzo Clone App for Business Growth (4).pptx
Top Features to Include in Your Winzo Clone App for Business Growth (4).pptx
 
How Recreation Management Software Can Streamline Your Operations.pptx
How Recreation Management Software Can Streamline Your Operations.pptxHow Recreation Management Software Can Streamline Your Operations.pptx
How Recreation Management Software Can Streamline Your Operations.pptx
 
Using IESVE for Room Loads Analysis - Australia & New Zealand
Using IESVE for Room Loads Analysis - Australia & New ZealandUsing IESVE for Room Loads Analysis - Australia & New Zealand
Using IESVE for Room Loads Analysis - Australia & New Zealand
 
Vitthal Shirke Microservices Resume Montevideo
Vitthal Shirke Microservices Resume MontevideoVitthal Shirke Microservices Resume Montevideo
Vitthal Shirke Microservices Resume Montevideo
 
Quarkus Hidden and Forbidden Extensions
Quarkus Hidden and Forbidden ExtensionsQuarkus Hidden and Forbidden Extensions
Quarkus Hidden and Forbidden Extensions
 
A Comprehensive Look at Generative AI in Retail App Testing.pdf
A Comprehensive Look at Generative AI in Retail App Testing.pdfA Comprehensive Look at Generative AI in Retail App Testing.pdf
A Comprehensive Look at Generative AI in Retail App Testing.pdf
 
Accelerate Enterprise Software Engineering with Platformless
Accelerate Enterprise Software Engineering with PlatformlessAccelerate Enterprise Software Engineering with Platformless
Accelerate Enterprise Software Engineering with Platformless
 
Cyaniclab : Software Development Agency Portfolio.pdf
Cyaniclab : Software Development Agency Portfolio.pdfCyaniclab : Software Development Agency Portfolio.pdf
Cyaniclab : Software Development Agency Portfolio.pdf
 
Enhancing Research Orchestration Capabilities at ORNL.pdf
Enhancing Research Orchestration Capabilities at ORNL.pdfEnhancing Research Orchestration Capabilities at ORNL.pdf
Enhancing Research Orchestration Capabilities at ORNL.pdf
 
BoxLang: Review our Visionary Licenses of 2024
BoxLang: Review our Visionary Licenses of 2024BoxLang: Review our Visionary Licenses of 2024
BoxLang: Review our Visionary Licenses of 2024
 
Globus Connect Server Deep Dive - GlobusWorld 2024
Globus Connect Server Deep Dive - GlobusWorld 2024Globus Connect Server Deep Dive - GlobusWorld 2024
Globus Connect Server Deep Dive - GlobusWorld 2024
 

Threat Modeling Lessons From Star Wars

  • 1. Threat Modeling Lessons from Star Wars Adam Shostack Presented Nov 2021
  • 3. Why Are We Here Today? • Engineer more secure systems • Structured, systematic and comprehensive approach • Engineer a consistent & predictable lack of surprise • Works for you (as people, organization and ecosystem)
  • 5. Agenda A simple approach to threat modeling Top 10 lessons
  • 6. Some history + A simple approach to threat modeling
  • 9. What Are We Working On? Data Flow Diagram example
  • 10. What Can Go Wrong? Remember STRIDE
  • 11. Spoofing By Lego Envy, http://www.eurobricks.com/forum/index.php?showtopic=64532
  • 13. By Seb H flickr.com/photos/88048956@N04/8531040850/ Repudiation
  • 15. Photo by Simon Liu flickr.com/photos/si-mocs/6999508124/ Information Disclosure (and consequences)
  • 16. Denial of Service Model by Nathan Sawaya http://brickartist.com/gallery/han-solo-in-
  • 18. STRIDE Mnemonic • STRIDE helps you remember: Spoofing Tampering Repudiation Information Disclosure Denial of Service Elevation of Privileges Help us be structured in how we think about threats https://shostack.org/training/courses/linkedin
  • 20. What Are We Going To Do About It? Threat Property Mitigation approach Spoofing Authentication  Passwords, multi-factor authN  Digital signatures Tampering Integrity  Permissions/ACLs  Digital signatures Repudiation Non-Repudiation (Accountability)  Secure logging and auditing  Digital Signatures Information Disclosure Confidentiality  Encryption  Permissions/ACLS Denial of Service Availability  Permissions/ACLs  Filtering  Quotas Elevation of privilege Authorization  Permissions/ACLs  Input validation
  • 22.
  • 23. Trap #1: “Search your feelings!” • “Think Like An Attacker” • Serious work is helped by structure Fix Trap
  • 24. #2: “You’re Never Done Threat Modeling” Model Identify Threats Mitigate Validate Model Identify Threats Mitigate Validate
  • 25. Trap #3: “The Way To Threat Model Is…” • Too much focus on specifics of how Use this framework (STRIDE) With this diagram type • Focus on helping people find good threats • Focus on different skills, systems Developers Operations Fix Trap
  • 26. Trap #3: Monolithic Processes Model Identify Threats Mitigate Validate Trap Fix: Building blocks
  • 27. Security mavens Experts in other areas Trap #3: “The Way To Threat Model Is…” Software Systems
  • 28. Trap #4: Threat Modeling as One Skill • “I should learn to threat model” • Think of threat modeling Like software development Techniques & repertoire • Technique: DFDs, STRIDE, Attack trees • Repertoire: Tools: Firesheep, Hydra, Kali Books: Cuckoo's Egg to Countdown to Zero Day • All used to analogize & reason about new systems Trap Fix
  • 29. Trap #5: “Threat Modeling is Easy” • Thinking your first threat model will be easy • “Driving is easy” • Once you learn • 40,000 US deaths per year • Plan to work, build muscle Trap Fix
  • 30. Trap #6: Threat Modeling is for Specialists • Thinking TM is for specialists • Make it like version control: Every developer, most sysadmins know some Some orgs have full time people managing trees • This is a stretch goal for threat modeling Trap Fix
  • 31. Trap #7: The Wrong Focus • Start from your assets • Start by thinking about your attackers • Threat modeling should focus on finding threats • Remember trap #3: “The way to threat model is” • Starting from assets or attackers work for some people Trap Fix
  • 32. Trap #8: Straining Against The Supply Chain • Trying to do it all Cost & feasibility of fixes changes Threats are “easy” to address at different parts o SoC chipmaker can ship trusted boot o Library developers can add logging, not see onsite logs • Think about an alliance along your supply chain Shared responsibility models Non-requirements Trap Fix
  • 33. Threats need mitigation Mitigations can be bypassed Requirements Threats Mitigations Requirements drive threats Threats drive requirements No mitigation? Simplify requirements Trap #9: Laser-Like Focus on Threats Interplay of attacks, mitigations and requirements
  • 34. Trap #10: Threat Model at the Wrong Time “Sir, we’ve analyzed their attack pattern, and … there is a danger”
  • 35. Summary • Anyone can threat model, and everyone should…soon! • The skills, techniques and repertoire can all be learned • There are many traps • Threat modeling can be the most effective way to drive security through your product, service or system
  • 36. “All models are wrong, some models are useful”
  • 38. Resources • Threatmodelingmanifesto.org • shostack.org /resources/ + /blog • shostack.org/training/ • adam@shostack.org
  • 40. Thank you! • Star Wars: Episodes IV-VI • Great Creative Commons Lego brick art: Lego Envy, http://www.eurobricks.com/forum/index.php?showtopic=64532 http://pinlac.com/LegoDSTractorBeam.html Seb H http://www.flickr.com/photos/88048956@N04/8531040850/ Simon Liu http://www.flickr.com/photos/si-mocs/6999508124/ Kaitan Tylerguy http://www.flickr.com/photos/kaitan/3326772088/ Nathan Sawaya, http://brickartist.com/gallery/han-solo-in-carbonite/ http://www.flickr.com/photos/prodiffusion/

Editor's Notes

  1. 20 years of threat modeling From startups to Microsoft
  2. Comfortable and confident they can threat model Do so as part of their jobs
  3. Phishing; believing things on the internet
  4. Aside: “no one would ever do that” 2 meanings, and also, mistakes
  5. “You make it look natural!” We don’t evolve to be able to find replay attacks Practice, practice
  6. If/how should we account for networking technology (FW, routers, load qbalancers)?
  7. Talk about the threat model has changed