Threat Modeling
            Revolutionized!

San Francisco Perl Mongers, 2012/03/27
David Fetter
david@fetter.org
Copyright© 2012, All rights reserved.
Why I'm Doing This
Every Security Measure
  is in a threat model
Implicit              Explicit



            1%
           explicit




            99%
Schneier's Security Wheel



                    ?
                        ¥
                        £
Schneier's Security Wheel
1. What assets are we trying to protect?




                                           ?
                                               ¥
                                               £
Schneier's Security Wheel
1. What assets are we trying to protect?

2. What are the risks to those assets?



                                           ?
                                               ¥
                                               £
Schneier's Security Wheel
1. What assets are we trying to protect?

2. What are the risks to those assets?

3. How well does the security measure mitigate those risks?
                                                              ?
                                                                  ¥
                                                                  £
Schneier's Security Wheel
1. What assets are we trying to protect?

2. What are the risks to those assets?

3. How well does the security measure mitigate those risks?

4. What other risks does the security measure cause?
                                                              ?
                                                                  ¥
                                                                  £
Schneier's Security Wheel
1. What assets are we trying to protect?

2. What are the risks to those assets?

3. How well does the security measure mitigate those risks?

4. What other risks does the security measure cause?
                                                              ?
                                                                  ¥
5. What costs and trade-offs does the security measure impose?    £
Schneier's Security Wheel
1. What assets are we trying to protect?

2. What are the risks to those assets?

3. How well does the security measure mitigate those risks?

4. What other risks does the security measure cause?
                                                              ?
                                                                  ¥
5. What costs and trade-offs does the security measure impose?    £
6. GOTO 1.
IMPLICIT
Security Theater
also known as
Ludicrous Bullshit
Huge Risk!
Fix the Problem
1. Bring each security measure into the explicit model.
1. Bring each security measure into the explicit model.
2. Engage the widest possible audience in the review.
1. Bring each security measure into the explicit model.
2. Engage the widest possible audience in the review.
3. Ensure each measure credibly mitigates at least one credible threat.
1. Bring each security measure into the explicit model.
2. Engage the widest possible audience in the review.
3. Ensure each measure credibly mitigates at least one credible threat.
4. Review the threat model regularly.
1. Bring each security measure into the explicit model.
2. Engage the widest possible audience in the review.
3. Ensure each measure credibly mitigates at least one credible threat.
4. Review the threat model regularly.
5. Remove security measures that no longer fit.
1. Bring each security measure into the explicit model.
2. Engage the widest possible audience in the review.
3. Ensure each measure credibly mitigates at least one credible threat.
4. Review the threat model regularly.
5. Remove security measures that no longer fit.
6. GOTO 1
Security is Everybody's Job!
Thanks!

• Meredith Patterson, who helped me realize
  that this wasn't just an idle stray thought.
• Devdas Bhagat (who turned me on to
  Complex Adaptive Systems)
Questions?
Comments?
Straitjackets?

Threat modeling sf_perl_mongers_20130227

  • 1.
    Threat Modeling Revolutionized! San Francisco Perl Mongers, 2012/03/27 David Fetter david@fetter.org Copyright© 2012, All rights reserved.
  • 2.
  • 3.
    Every Security Measure is in a threat model
  • 4.
    Implicit Explicit 1% explicit 99%
  • 5.
  • 6.
    Schneier's Security Wheel 1.What assets are we trying to protect? ? ¥ £
  • 7.
    Schneier's Security Wheel 1.What assets are we trying to protect? 2. What are the risks to those assets? ? ¥ £
  • 8.
    Schneier's Security Wheel 1.What assets are we trying to protect? 2. What are the risks to those assets? 3. How well does the security measure mitigate those risks? ? ¥ £
  • 9.
    Schneier's Security Wheel 1.What assets are we trying to protect? 2. What are the risks to those assets? 3. How well does the security measure mitigate those risks? 4. What other risks does the security measure cause? ? ¥ £
  • 10.
    Schneier's Security Wheel 1.What assets are we trying to protect? 2. What are the risks to those assets? 3. How well does the security measure mitigate those risks? 4. What other risks does the security measure cause? ? ¥ 5. What costs and trade-offs does the security measure impose? £
  • 11.
    Schneier's Security Wheel 1.What assets are we trying to protect? 2. What are the risks to those assets? 3. How well does the security measure mitigate those risks? 4. What other risks does the security measure cause? ? ¥ 5. What costs and trade-offs does the security measure impose? £ 6. GOTO 1.
  • 12.
  • 13.
  • 14.
  • 15.
  • 16.
  • 17.
  • 19.
    1. Bring eachsecurity measure into the explicit model.
  • 20.
    1. Bring eachsecurity measure into the explicit model. 2. Engage the widest possible audience in the review.
  • 21.
    1. Bring eachsecurity measure into the explicit model. 2. Engage the widest possible audience in the review. 3. Ensure each measure credibly mitigates at least one credible threat.
  • 22.
    1. Bring eachsecurity measure into the explicit model. 2. Engage the widest possible audience in the review. 3. Ensure each measure credibly mitigates at least one credible threat. 4. Review the threat model regularly.
  • 23.
    1. Bring eachsecurity measure into the explicit model. 2. Engage the widest possible audience in the review. 3. Ensure each measure credibly mitigates at least one credible threat. 4. Review the threat model regularly. 5. Remove security measures that no longer fit.
  • 24.
    1. Bring eachsecurity measure into the explicit model. 2. Engage the widest possible audience in the review. 3. Ensure each measure credibly mitigates at least one credible threat. 4. Review the threat model regularly. 5. Remove security measures that no longer fit. 6. GOTO 1
  • 25.
  • 26.
    Thanks! • Meredith Patterson,who helped me realize that this wasn't just an idle stray thought. • Devdas Bhagat (who turned me on to Complex Adaptive Systems)
  • 27.

Editor's Notes

  • #2 Thanks very much to my employer, who does not know about this talk, and may not approve of it when they find out.\n
  • #3 The people who protect the helpless need to do their job right.\n
  • #4 \n
  • #5 \n
  • #6 \n
  • #7 \n
  • #8 \n
  • #9 \n
  • #10 \n
  • #11 \n
  • #12 \n
  • #13 \n
  • #14 \n
  • #15 \n
  • #16 People inside the trust boundary who think security is nonsense, and are in a position to do enormous damage in the process of making their lives simpler.\n
  • #17 \n
  • #18 Do this a little bit at a time and figure out how the system has adapted. Every measure can and will be gamed. Make sure you keep this in mind when designing same.\n
  • #19 Do this a little bit at a time and figure out how the system has adapted. Every measure can and will be gamed. Make sure you keep this in mind when designing same.\n
  • #20 Do this a little bit at a time and figure out how the system has adapted. Every measure can and will be gamed. Make sure you keep this in mind when designing same.\n
  • #21 Do this a little bit at a time and figure out how the system has adapted. Every measure can and will be gamed. Make sure you keep this in mind when designing same.\n
  • #22 Do this a little bit at a time and figure out how the system has adapted. Every measure can and will be gamed. Make sure you keep this in mind when designing same.\n
  • #23 Do this a little bit at a time and figure out how the system has adapted. Every measure can and will be gamed. Make sure you keep this in mind when designing same.\n
  • #24 \n
  • #25 \n
  • #26 \n