280 likes | 547 Views
Threat Modeling at Symantec. Edward Bonver Principal Software Engineer, Symantec Product Security Team Edward_Bonver@Symantec.com. Sample Agenda. What? – Intro & Definitions. 1. Who? When? How Often?. 2. How? – Not Too Technical Details of the Process. 3. A Few Extra Words of Advice. 4.
E N D
Threat Modeling at Symantec Edward Bonver Principal Software Engineer, Symantec Product Security Team Edward_Bonver@Symantec.com OWASP WWW, Irvine, CA, January 28, 2011 Threat Modeling at Symantec
Sample Agenda What? – Intro & Definitions 1 Who? When? How Often? 2 How? – Not Too Technical Details of the Process 3 A Few Extra Words of Advice 4 Tools 5 OWASP WWW, Irvine, CA, January 28, 2011 Threat Modeling at Symantec
Defining Terms - What is a Threat? • Simplest definition: "The adversary's goals, or what an adversary might try to do to a system" • "Threat Modeling" == "Adversary's Goal Modeling" or "Modeling the Adversary's Goals“ OWASP WWW, Irvine, CA, January 28, 2011 Threat Modeling at Symantec Threat Modeling at Symantec
What’s Threat Modeling? Threat modeling is a process of assessing and documenting a system’s security risks • Uncover security weaknesses and vulnerabilities • Rank risks • Come up with mitigations • Understand your system better OWASP WWW, Irvine, CA, January 28, 2011 Threat Modeling at Symantec
Protecting Your House OWASP WWW, Irvine, CA, January 28, 2011 Threat Modeling at Symantec
Pick Lock Learn Combo Cut Open Safe Install Improperly Find Written Combo Get Combo from Target Threaten Blackmail Evesdrop Bribe AND Listen to Conversation Get Target to State Combo Thinking Like an Attacker Open Safe OWASP WWW, Irvine, CA, January 28, 2011 Threat Modeling at Symantec
Quality Assurance • Questions: • When do your QA folks engage in a project? • QA team composition • Experience • Environment knowledge • Understand your system better • Test plans & test cases • Requirements OWASP WWW, Irvine, CA, January 28, 2011 Threat Modeling at Symantec
Security Requirements… Security Requirements? Security Requirements? SECURITY REQUIREMENTS! Security Requirements! Security Requirements??? Requirements. Add(“…and System Must be Secure!”); OWASP WWW, Irvine, CA, January 28, 2011 Threat Modeling at Symantec
A Few Philosophical Thoughts… Threat modeling is like sushi • It’s a team activity (see next slide) OWASP WWW, Irvine, CA, January 28, 2011 Threat Modeling at Symantec
Roles – Who is Involved • Architects and Developers • QA • Program Managers • Product Managers • Security Experts (Consultants) OWASP WWW, Irvine, CA, January 28, 2011 Threat Modeling at Symantec
When to Threat Model? Understanding Implementing Monitoring Concept Planning Development Verification Delivery Sustaining Security Training Security Goals and Planning Risk Assessment Threat model Best Practices Code Analysis Tools (Automation) Security & Penetration Test Fuzz Tests Config Analysis Tools Readiness Review Checkpoint Vulnerability Mgmt OWASP WWW, Irvine, CA, January 28, 2011 Threat Modeling at Symantec
Why Threat Models are Effective? • ~50%of all vulnerabilities introduced during the architecture and design phase. • Supported by Common Weakness Enumeration (CWE), from the field OWASP WWW, Irvine, CA, January 28, 2011 Threat Modeling at Symantec Threat Modeling at Symantec
Getting There • Draw Diagram • Analyze Model • Calculate Risk • Plan Mitigation OWASP WWW, Irvine, CA, January 28, 2011 Threat Modeling at Symantec
Draw Diagram OWASP WWW, Irvine, CA, January 28, 2011 Threat Modeling at Symantec Threat Modeling at Symantec
Analyze Model Spoofing S Can an attacker gain access using a false identity? Tampering T Can an attacker modify data as it flows through the application? Repudiation R If an attacker denies an exploit, can you prove him or her wrong? Information disclosure I Can an attacker gain access to private or potentially injurious data? Denial of service D Can an attacker crash or reduce the availability of the system? Elevation of privilege E Can an attacker assume the identity of a privileged user? OWASP WWW, Irvine, CA, January 28, 2011 Threat Modeling at Symantec
Multi- Process Data Store External Entity SR SR TID TID TID TID TID TID STIDE STIDE STIDE Data flow Process DFD shows possible Effects of Vulnerabilities OWASP WWW, Irvine, CA, January 28, 2011 Threat Modeling at Symantec
Calculate Risk • Common Vulnerability Scoring System (CVSSv2) • A rating system that goes from 1-10. • Use the National Vulnerability Database calculator OWASP WWW, Irvine, CA, January 28, 2011 Threat Modeling at Symantec
CVSSv2 Calculator Cutting Edge 2010-11: Threat Modeling at Symantec
Plan Mitigation • Easy enough • CWE to the rescue OWASP WWW, Irvine, CA, January 28, 2011 Threat Modeling at Symantec
Unmitigated Threats Now what? OWASP WWW, Irvine, CA, January 28, 2011
Dealing with Risk • Reduce the Risk • Transfer the Risk • Accept the Risk • Reject the Risk OWASP WWW, Irvine, CA, January 28, 2011 Threat Modeling at Symantec
Final Considerations • Threat Modeling is an ongoing process • Start small • Revisit Threat Models • Threat models are sensitive documents • Keep them in a safe location with limited team access OWASP WWW, Irvine, CA, January 28, 2011 Threat Modeling at Symantec
Documenting All Threats • Threats always exist, live forever • Vulnerabilities exist if there is an unmitigated path to realizing a threat Asset Mitigation Threat Vulnerability OWASP WWW, Irvine, CA, January 28, 2011 Threat Modeling at Symantec
Tools • Microsoft SDL Threat Modeling Tool OWASP WWW, Irvine, CA, January 28, 2011 Threat Modeling at Symantec
Tools • Excel • Digital Camera • Microsoft Word (or Notepad) • Good Revision System (CVS, Perforce, etc.) OWASP WWW, Irvine, CA, January 28, 2011 Threat Modeling at Symantec
Tools • Elevation of Privilege Card Game OWASP WWW, Irvine, CA, January 28, 2011 Threat Modeling at Symantec
Edward Bonver Principal Software Engineer, Symantec Product Security Team Edward_Bonver@Symantec.com OWASP WWW, Irvine, CA, January 28, 2011 Threat Modeling at Symantec