Threat Modeling
Learn what threat modeling is, how it works, process, techniques, and methodologies.
Threat modeling involves identifying and communicating information about the threats that may impact a particular system or network. Security threat modeling enables an IT team to understand the nature of threats, as well as how they may impact the network. In addition, threat modeling can be used to analyze the dangers threats pose to applications, taking into account their potential vulnerabilities.
Aside from protecting networks and applications, threat modeling can also aid in securing Internet-of-Things (IoT) devices, as well as processes the business depends on. Because of its versatility, threat modeling provides an organization with a veritable cyber navy, protecting the company from a variety of threat vectors.
The procedure for threat modeling varies depending on the system being examined. However, virtually any tech-dependent business process can benefit in one way or another. With threat modeling, the scope of threats facing a particular process or system can be narrowed down, then examined. This eliminates confusion about what the threats may be, as well as how to defend against them. Further, it gives IT teams the information they need to defend the system long before a threat impacts it.
The threat modeling process depends on a sequential series of actions. Even though they can be performed individually, they are interdependent, so executing them together provides a more comprehensive view of the threat situation. The steps tend to include:
The thinking powering the threat modeling process can be summed up by outlining the following:
Even though the types of threats being modeled invariably change with each situation, the basic process steps remain consistent. They need to involve:
A key step in the threat modeling process involves decomposing an element of infrastructure or an application that may face a threat. Decomposition involves making sure you understand how the application works and how it interfaces with entities within its system, as well as those that could pose a problem.
To do this, the application or system’s behavior needs to be understood within the context of a variety of different situations. These may include situations where users with different levels of access connect, how the system behaves while connected to different network architectures, or how the system processes different kinds of data. While examining behavior, you need to outline potential entry points and vulnerabilities, and how these change given different interactions.
For example, an IoT device may exhibit safe behavior while connected to a secure wide-area network (WAN) as the DevOps team is designing the software that controls it. However, while threat modeling this device, its behavior may leave it open to vulnerabilities when connected to the general internet. Further, if its traffic has to be managed using cloud-based processing, there may be issues with latency or packet degradation that could present other potential issues and even novel threats the team had not accounted for.
Therefore, the way the application that controls the IoT device behaves needs to be examined in a variety of network architectures to get a full understanding of the potential threats.
To ensure nothing is missed, teams should use a diagram that outlines the flow of data. This provides them with a visual representation of how data moves in, through, and out of a system or application. It also shows how the data is changed at various stages of its processing or storage. In addition, the flow diagram displays where data is stored as it moves through the system.
The data flow diagram makes it easier to identify trust boundaries. These show the points at which the data must be validated prior to it being allowed to enter into an entity that will use it. Returning to the IoT device example, data gathered by the device would have to flow to wherever it will be processed, whether in the cloud or on the edge. Regardless, the data will have to enter a network. The data flow diagram will outline the point at which the data will have to cross from the IoT device into the network, allowing the team to set up a trust boundary at this location. This will signal security teams to enact protections that guard the network from malicious code that a hacker could use in conjunction with the IoT device.
STRIDE stands for spoofing, tampering, repudiation, informative disclosure, denial of service (DoS), and elevation of privilege.
DREAD stands for damage potential, reproducibility, exploitability, affected users, and discoverability.
The acronym PASTA stems from Process for Attack Simulation and Threat Analysis. This involves seven steps:
VAST refers to Visual, Agile, and Simple Threat modeling. VAST is a foundational element of a threat modeling platform called ThreatModeler. VAST integrates within workflows designed using the principles of DevOps.
Trike is an open-source framework that seeks to defend a system instead of attempting to replicate how an actor may attack it. With the Trike framework, users make a model of the application or system they are defending. You then use the acronym CRUD to see who can:
This is studied with the aid of a data flow diagram. The threats examined include either elevations of privileges or denials of service.
OCTAVE refers to Operationally Critical Threat Asset and Vulnerability Evaluation. It was designed by Carnegie Mellon University. OCTAVE requires three different phases:
NIST refers to the National Institute of Standards and Technology, which has developed its own threat modeling system that focuses on data. NIST requires four phases:
Threat modeling involves identifying and communicating information about the threats that may impact a particular system or network. Security threat modeling enables an IT team to understand the nature of threats, as well as how they may impact the network. In addition, threat modeling can be used to analyze the dangers threats pose to applications, taking into account their potential vulnerabilities.
Some examples of threat models include STRIDE, DREAD, PASTA, VAST, OCTAVE, and NIST.
The threat modeling process depends on a sequential series of actions. Executing them together provides a comprehensive view of the threat situation. The steps tend to include:
The four steps of making a threat model include:
Please fill out the form and a knowledgeable representative will get in touch with you soon.