SlideShare uma empresa Scribd logo
1 de 44
Steven Carlson - Nebraska.Code() - 2022
Threat Modeling All Day!
A Practical Guide for Innovation Teams
Software Engineer who is passionate about clean
secure code.
Employment: 15 years in tech
•3+ years local government
•10+ years in FinTech
•1 year in E-commerce
•Helpdesk -> Software
Engineer -> Security ->
DevOps = Product Security
Steven Carlson
This talk will demo one threat modeling methodology and how an
engineering team is appending to their Secure Software Development
Life Cycle.
The goal is to create a single platform for communicating architectural
risk and planning mitigations within sprints. This will not only address
security concerns sooner in a product's lifecycle but establish a trusting
relationship between engineering and security teams. As an ever-
evolving space, to reduce risk and deploy products to market, this is one
additional step any software-focused team can quickly adapt to their
practices.
Threat Modeling All Day!
Agenda
Do all the things!
•Story Time
•In a Nutshell
•Implementation
•Bonus: Exercise
Story Time
•Architect
•Security
•Risk
•Engineers
•Quality Assurance
Product Team
How are we going to
manage access to
our apis?
What is the
quickest
solution?
What is the
longer term goal?
How did you come
up with this path?
In a Nutshell
OWASP Top 10
A04:2021-Insecure Design is a
new category for 2021, with a
focus on risks related to design
flaws. If we genuinely want to
"move left" as an industry, it calls
for more use of threat modeling,
secure design patterns and
principles, and reference
architectures.
Threat Modeling
•A conceptual exercise that aims to
identify security related flaws in the
design of a system, and to identify
modifications or activities that will mitigate
those flaws.
Focus On
•What are we working on?
•What can go wrong?
•What are we going to do about it?
•Did we do a good job?
Threat Model Template
Stride Control
Rate Findings
Implementation
Threat Dragon
● Supported by the Open Source
Community and OWASP
● Authentication handled by
gitlab and/or github
● Outputs a human readable
json file stored with source
code
•Identify all process, stores,
and actors for a feature
•Follow STRIDE of all
resources
•Create Jira tickets and
prioritize based on rating
•Check-in threat model with
source code
Threat and Mitigations
Bonus: Exercise
The plan
How are going to rob the bank
•People
•Process
•Technology
•<fill>
Stride
Actors, process, and storage
•Spoofing
•Tramping
•Repudiation
•Information disclosure
•Denial of Service
•Elevation of Privilege
•<fill>
What are we going
to do about it?
Controls
Hide ourselves from detection
•Spoofing
•Tramping
•Repudiation
•Information disclosure
•Denial of Service
•Elevation of Privilege
•<fill>
Success
Did we get any money
•Create a solid plan
•Test plan before executing - review threat
model several times
•Artifact for next attempt(s)
Questions?
Resources
• https://www.threatmodelingmanifesto.org/
• https://github.com/OWASP/threat-dragon/releases
• https://threatdragon.github.io/threat-model-diagrams/
• https://owasp.org/www-community/Threat_Modeling
• https://www.securityjourney.com/resources/appsec-podcast
• https://threagile.io/
Glossary
• Application Security - the process of developing, adding, and testing
security features within applications to prevent security vulnerabilities
against threats.
• Infrastructure Security - the security provided to protect infrastructure,
especially critical infrastructure such as cloud or datacenter resources.
• Software Development Life Cycle (SDLC) - a conceptual framework
describing all activities in a software development project from planning
to maintenance. This process is associated with several models, each
including a variety of tasks and activities.
Please fill them out
Steven Carlson - Nebraska.Code() - 2022
https://about.me/rockrunner

Mais conteúdo relacionado

Semelhante a Threat Modeling All Day!

OWASP LASCON 2015 - Agile Security, The Fails Noboty Told You About
OWASP LASCON 2015 - Agile Security, The Fails Noboty Told You About OWASP LASCON 2015 - Agile Security, The Fails Noboty Told You About
OWASP LASCON 2015 - Agile Security, The Fails Noboty Told You About
Daniel Liber
 
Succeeding-Marriage-Cybersecurity-DevOps final
Succeeding-Marriage-Cybersecurity-DevOps finalSucceeding-Marriage-Cybersecurity-DevOps final
Succeeding-Marriage-Cybersecurity-DevOps final
rkadayam
 

Semelhante a Threat Modeling All Day! (20)

DevSecOps - Colocando segurança na esteira
DevSecOps - Colocando segurança na esteiraDevSecOps - Colocando segurança na esteira
DevSecOps - Colocando segurança na esteira
 
VMWare Tech Talk: "The Road from Rugged DevOps to Security Chaos Engineering"
VMWare Tech Talk: "The Road from Rugged DevOps to Security Chaos Engineering"VMWare Tech Talk: "The Road from Rugged DevOps to Security Chaos Engineering"
VMWare Tech Talk: "The Road from Rugged DevOps to Security Chaos Engineering"
 
The State of DevSecOps
The State of DevSecOpsThe State of DevSecOps
The State of DevSecOps
 
State of DevSecOps - DevOpsDays Jakarta 2019
State of DevSecOps - DevOpsDays Jakarta 2019State of DevSecOps - DevOpsDays Jakarta 2019
State of DevSecOps - DevOpsDays Jakarta 2019
 
State of DevSecOps - GTACS 2019
State of DevSecOps - GTACS 2019State of DevSecOps - GTACS 2019
State of DevSecOps - GTACS 2019
 
ISACA Ireland Keynote 2015
ISACA Ireland Keynote 2015ISACA Ireland Keynote 2015
ISACA Ireland Keynote 2015
 
Zero to Ninety in Securing DevOps
Zero to Ninety in Securing DevOpsZero to Ninety in Securing DevOps
Zero to Ninety in Securing DevOps
 
Product Security
Product SecurityProduct Security
Product Security
 
OWASP LASCON 2015 - Agile Security, The Fails Noboty Told You About
OWASP LASCON 2015 - Agile Security, The Fails Noboty Told You About OWASP LASCON 2015 - Agile Security, The Fails Noboty Told You About
OWASP LASCON 2015 - Agile Security, The Fails Noboty Told You About
 
DevSecCon KeyNote London 2015
DevSecCon KeyNote London 2015DevSecCon KeyNote London 2015
DevSecCon KeyNote London 2015
 
DevSecCon Keynote
DevSecCon KeynoteDevSecCon Keynote
DevSecCon Keynote
 
Salesforce x DevOps 101.pdf
Salesforce x DevOps 101.pdfSalesforce x DevOps 101.pdf
Salesforce x DevOps 101.pdf
 
Succeeding-Marriage-Cybersecurity-DevOps final
Succeeding-Marriage-Cybersecurity-DevOps finalSucceeding-Marriage-Cybersecurity-DevOps final
Succeeding-Marriage-Cybersecurity-DevOps final
 
Owasp summit slides day 2
Owasp summit slides day 2Owasp summit slides day 2
Owasp summit slides day 2
 
SDLC & DevSecOps
SDLC & DevSecOpsSDLC & DevSecOps
SDLC & DevSecOps
 
Outpost24 webinar: Turning DevOps and security into DevSecOps
Outpost24 webinar: Turning DevOps and security into DevSecOpsOutpost24 webinar: Turning DevOps and security into DevSecOps
Outpost24 webinar: Turning DevOps and security into DevSecOps
 
Secure Your DevOps Pipeline Best Practices Meetup 08022024.pptx
Secure Your DevOps Pipeline Best Practices Meetup 08022024.pptxSecure Your DevOps Pipeline Best Practices Meetup 08022024.pptx
Secure Your DevOps Pipeline Best Practices Meetup 08022024.pptx
 
S360 2015 dev_secops_program
S360 2015 dev_secops_programS360 2015 dev_secops_program
S360 2015 dev_secops_program
 
Why 'positive security' is a software security game changer
Why 'positive security' is a software security game changerWhy 'positive security' is a software security game changer
Why 'positive security' is a software security game changer
 
Unleash Team Productivity with Real-Time Operations (DEV203-S) - AWS re:Inven...
Unleash Team Productivity with Real-Time Operations (DEV203-S) - AWS re:Inven...Unleash Team Productivity with Real-Time Operations (DEV203-S) - AWS re:Inven...
Unleash Team Productivity with Real-Time Operations (DEV203-S) - AWS re:Inven...
 

Último

Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 

Último (20)

HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 

Threat Modeling All Day!

  • 1. Steven Carlson - Nebraska.Code() - 2022 Threat Modeling All Day! A Practical Guide for Innovation Teams
  • 2. Software Engineer who is passionate about clean secure code. Employment: 15 years in tech •3+ years local government •10+ years in FinTech •1 year in E-commerce •Helpdesk -> Software Engineer -> Security -> DevOps = Product Security Steven Carlson
  • 3. This talk will demo one threat modeling methodology and how an engineering team is appending to their Secure Software Development Life Cycle. The goal is to create a single platform for communicating architectural risk and planning mitigations within sprints. This will not only address security concerns sooner in a product's lifecycle but establish a trusting relationship between engineering and security teams. As an ever- evolving space, to reduce risk and deploy products to market, this is one additional step any software-focused team can quickly adapt to their practices. Threat Modeling All Day!
  • 4. Agenda Do all the things! •Story Time •In a Nutshell •Implementation •Bonus: Exercise
  • 6.
  • 8. How are we going to manage access to our apis?
  • 9.
  • 11.
  • 12. What is the longer term goal?
  • 13.
  • 14. How did you come up with this path?
  • 15.
  • 17. OWASP Top 10 A04:2021-Insecure Design is a new category for 2021, with a focus on risks related to design flaws. If we genuinely want to "move left" as an industry, it calls for more use of threat modeling, secure design patterns and principles, and reference architectures.
  • 18. Threat Modeling •A conceptual exercise that aims to identify security related flaws in the design of a system, and to identify modifications or activities that will mitigate those flaws.
  • 19. Focus On •What are we working on? •What can go wrong? •What are we going to do about it? •Did we do a good job?
  • 20.
  • 25.
  • 26. Threat Dragon ● Supported by the Open Source Community and OWASP ● Authentication handled by gitlab and/or github ● Outputs a human readable json file stored with source code
  • 27.
  • 28. •Identify all process, stores, and actors for a feature •Follow STRIDE of all resources •Create Jira tickets and prioritize based on rating •Check-in threat model with source code Threat and Mitigations
  • 29.
  • 31.
  • 32.
  • 33. The plan How are going to rob the bank •People •Process •Technology •<fill>
  • 34.
  • 35. Stride Actors, process, and storage •Spoofing •Tramping •Repudiation •Information disclosure •Denial of Service •Elevation of Privilege •<fill>
  • 36. What are we going to do about it?
  • 37. Controls Hide ourselves from detection •Spoofing •Tramping •Repudiation •Information disclosure •Denial of Service •Elevation of Privilege •<fill>
  • 38.
  • 39. Success Did we get any money •Create a solid plan •Test plan before executing - review threat model several times •Artifact for next attempt(s)
  • 41. Resources • https://www.threatmodelingmanifesto.org/ • https://github.com/OWASP/threat-dragon/releases • https://threatdragon.github.io/threat-model-diagrams/ • https://owasp.org/www-community/Threat_Modeling • https://www.securityjourney.com/resources/appsec-podcast • https://threagile.io/
  • 42. Glossary • Application Security - the process of developing, adding, and testing security features within applications to prevent security vulnerabilities against threats. • Infrastructure Security - the security provided to protect infrastructure, especially critical infrastructure such as cloud or datacenter resources. • Software Development Life Cycle (SDLC) - a conceptual framework describing all activities in a software development project from planning to maintenance. This process is associated with several models, each including a variety of tasks and activities.
  • 44. Steven Carlson - Nebraska.Code() - 2022 https://about.me/rockrunner