Top Banner
@jschauma ConFoo Vancouver 2016
50

Know Your Enemy - An Introduction to Threat Modeling

Apr 13, 2017

Download

Technology

Jan Schaumann
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Know Your Enemy - An Introduction to Threat Modeling

@jschauma  ConFoo  Vancouver  2016  

Page 2: Know Your Enemy - An Introduction to Threat Modeling

Jerry:  Well,  what  makes  them  think  you're  a  risk  management  expert?  George:  I  guess  it's  on  my  resume.  

@jschauma  ConFoo  Vancouver  2016  

Page 3: Know Your Enemy - An Introduction to Threat Modeling

@jschauma  ConFoo  Vancouver  2016  

Page 4: Know Your Enemy - An Introduction to Threat Modeling

@jschauma  ConFoo  Vancouver  2016  

Page 5: Know Your Enemy - An Introduction to Threat Modeling

@jschauma  ConFoo  Vancouver  2016  

Page 6: Know Your Enemy - An Introduction to Threat Modeling

@jschauma  ConFoo  Vancouver  2016  

Page 7: Know Your Enemy - An Introduction to Threat Modeling

@jschauma  ConFoo  Vancouver  2016  

Page 8: Know Your Enemy - An Introduction to Threat Modeling

@jschauma  ConFoo  Vancouver  2016  

Page 9: Know Your Enemy - An Introduction to Threat Modeling

@jschauma  https://v.gd/ConFooThreatModel01 ConFoo  Vancouver  2016  

Page 10: Know Your Enemy - An Introduction to Threat Modeling

@jschauma  

Ceci n’est pas un hacker.

ConFoo  Vancouver  2016  

Page 11: Know Your Enemy - An Introduction to Threat Modeling

@jschauma  

Mais ceci oui ce sont des hackers.  

dedicated,  human  adversaries  ConFoo  Vancouver  2016  

Page 12: Know Your Enemy - An Introduction to Threat Modeling

@jschauma  ConFoo  Vancouver  2016  

Page 13: Know Your Enemy - An Introduction to Threat Modeling

@jschauma  ConFoo  Vancouver  2016  

Page 14: Know Your Enemy - An Introduction to Threat Modeling

@jschauma  ConFoo  Vancouver  2016  

Page 15: Know Your Enemy - An Introduction to Threat Modeling

@jschauma  ConFoo  Vancouver  2016  

Page 16: Know Your Enemy - An Introduction to Threat Modeling

https://v.gd/ConFooThreatModel02

Threat Model 101

@jschauma  ConFoo  Vancouver  2016  

By  James  Mickens  

Page 17: Know Your Enemy - An Introduction to Threat Modeling

•  idenKfy  assets  •  idenKfy  vulnerabiliKes  •  idenKfy  likely  threat  actors          (categorized  by  objecKves  &  capabiliKes)  •  idenKfy  defensive  capabiliKes  •  determine  risk  score  •  rinse  and  repeat  

Threat Model 101

@jschauma  ConFoo  Vancouver  2016  

Page 18: Know Your Enemy - An Introduction to Threat Modeling

Figure  out  what  you  can  defend  against  whom,  eh?  

@jschauma  ConFoo  Vancouver  2016  

Page 19: Know Your Enemy - An Introduction to Threat Modeling

Figure  out  what  you  can  defend  against  whom,  eh?  

@jschauma  ConFoo  Vancouver  2016  

Page 20: Know Your Enemy - An Introduction to Threat Modeling

A  Concept  is  Stronger  than  a  Fact.  -­‐  Charlo)e  Perkins  Gilman  

@jschauma  ConFoo  Vancouver  2016  

Page 21: Know Your Enemy - An Introduction to Threat Modeling

WWW

Webservice

WWW

WWW Server

WWW

WWW Server @jschauma  ConFoo  Vancouver  2016  

Page 22: Know Your Enemy - An Introduction to Threat Modeling

WWW

Webservice

Different  /  separate  Threat  Models  @jschauma  ConFoo  Vancouver  2016  

Page 23: Know Your Enemy - An Introduction to Threat Modeling

Threat   Property  

Spoofing   AuthenKcaKon  Tampering   Integrity  RepudiaKon   Non-­‐RepudiaKon  InformaKon  Disclosure   ConfidenKality  Denial  of  Service   Availability  ElevaKon  of  Privilege   AuthorizaKon  

STRIDE  

@jschauma  ConFoo  Vancouver  2016  

Page 24: Know Your Enemy - An Introduction to Threat Modeling

@jschauma  ConFoo  Vancouver  2016  

Page 25: Know Your Enemy - An Introduction to Threat Modeling

@jschauma  ConFoo  Vancouver  2016  

Page 26: Know Your Enemy - An Introduction to Threat Modeling

@jschauma  ConFoo  Vancouver  2016  

Page 27: Know Your Enemy - An Introduction to Threat Modeling

@jschauma  ConFoo  Vancouver  2016  

Page 28: Know Your Enemy - An Introduction to Threat Modeling

DREAD  Damage   How  bad  would  the  a_ack  be?  Reproducability   How  easy  to  recreate  the  a_ack?  Exploitability   How  easy  to  launch  the  a_ack?  Affected  Users   How  many  are  impacted?  Discoverability   How  easy  to  discover  for  a_acker?  

@jschauma  ConFoo  Vancouver  2016  

Page 29: Know Your Enemy - An Introduction to Threat Modeling

DREAD+D  Damage   How  bad  would  the  a_ack  be?  Reproducability   How  easy  to  recreate  the  a_ack?  Exploitability   How  easy  to  launch  the  a_ack?  Affected  Users   How  many  are  impacted?  Discoverability   How  easy  to  discover  for  a_acker?  DetecKon   How  hard  to  detect  for  defender?  

@jschauma  ConFoo  Vancouver  2016  

Page 30: Know Your Enemy - An Introduction to Threat Modeling

DREAD+D  

@jschauma  ConFoo  Vancouver  2016  

https://v.gd/ConFooThreatModel03

Page 31: Know Your Enemy - An Introduction to Threat Modeling

•  competing incentives •  industry espionage •  covert operations •  low risk profile •  bound by (some) rules •  married to a supercomputer

Know Your Enemy https://v.gd/ConFooThreatModel04

@jschauma  ConFoo  Vancouver  2016  

Page 32: Know Your Enemy - An Introduction to Threat Modeling

•  low skill level •  opportunistic •  chaotic, yet predictable •  there may be more than you think •  never wears pants

https://v.gd/ConFooThreatModel04

Know Your Enemy

@jschauma  ConFoo  Vancouver  2016  

Page 33: Know Your Enemy - An Introduction to Threat Modeling

•  specific objective •  targeted attacks •  resourceful •  relentless •  only bound by gravity

https://v.gd/ConFooThreatModel04

Know Your Enemy

@jschauma  ConFoo  Vancouver  2016  

Page 34: Know Your Enemy - An Introduction to Threat Modeling

•  very powerful / resourceful •  may have privileged controls •  operates both clandestine & overt •  may utilize Wile E. Coyote,

Mayor Quimby, Fat Tony

https://v.gd/ConFooThreatModel04

Know Your Enemy

@jschauma  ConFoo  Vancouver  2016  

Page 35: Know Your Enemy - An Introduction to Threat Modeling

Understanding  your  adversaries'  moKves  and  capabiliKes  is  criKcal.  

 

@jschauma  ConFoo  Vancouver  2016  

Page 36: Know Your Enemy - An Introduction to Threat Modeling

https://xkcd.com/538/

@jschauma  ConFoo  Vancouver  2016  

Page 37: Know Your Enemy - An Introduction to Threat Modeling

Also works.

https://xkcd.com/538/

@jschauma  ConFoo  Vancouver  2016  

Page 38: Know Your Enemy - An Introduction to Threat Modeling

@jschauma  ConFoo  Vancouver  2016  

Page 39: Know Your Enemy - An Introduction to Threat Modeling

@jschauma  ConFoo  Vancouver  2016  

Page 40: Know Your Enemy - An Introduction to Threat Modeling

@jschauma  ConFoo  Vancouver  2016  

Page 41: Know Your Enemy - An Introduction to Threat Modeling

@jschauma  ConFoo  Vancouver  2016  

Page 42: Know Your Enemy - An Introduction to Threat Modeling

@jschauma  ConFoo  Vancouver  2016  

Page 43: Know Your Enemy - An Introduction to Threat Modeling

@jschauma  ConFoo  Vancouver  2016  

Page 44: Know Your Enemy - An Introduction to Threat Modeling

@jschauma  ConFoo  Vancouver  2016  

Page 45: Know Your Enemy - An Introduction to Threat Modeling

@jschauma  ConFoo  Vancouver  2016  

Page 46: Know Your Enemy - An Introduction to Threat Modeling

Threat  Modeling  Process  •  idenKfy  assets,  assign  values  •  use  STRIDE  to  idenKfy  threats  •  use  DREAD+D  to  derive  threat  score  •  determine  /  recommend  defenses  •  zoom  out  /  zoom  in  &  repeat  

@jschauma  ConFoo  Vancouver  2016  

Page 47: Know Your Enemy - An Introduction to Threat Modeling

Your  adversaries  are  people,  too.  Understand  their  moKves.  

@jschauma  ConFoo  Vancouver  2016  

Page 48: Know Your Enemy - An Introduction to Threat Modeling

You  can't  defend  against  all  threats  all  of  the  Kme.  

 

@jschauma  ConFoo  Vancouver  2016  

Page 49: Know Your Enemy - An Introduction to Threat Modeling

A_ackers  will  go  for  the  lowest  hanging  fruit.    

Raising  the  cost  of  a_ack  –  not  eliminaKng  the  enKre  threat  –  is  frequently  sufficient.  

@jschauma  ConFoo  Vancouver  2016  

Page 50: Know Your Enemy - An Introduction to Threat Modeling

@jschauma  

•  Know  your  enemy.  Understand  their  moKves.  •  Know  your  vulnerabiliKes.  Rank  your  threats.  •  Know  your  defensive  capabiliKes.  Be  realis6c.  

PrioriKze  what  ma_ers.  

ConFoo  Vancouver  2016