140 likes | 385 Views
PART III Threat Modeling Demo & Practice. Threat Modeling Tools. Threat Modeling Analysis and Modeling (TAM) (Microsoft) Pros: Flexible, Build in Threat & Attack Library Cons: Not updated-supported, DFD require VISIO ™ installation SDL Threat Modeling (Microsoft)
E N D
Threat Modeling Tools • Threat Modeling Analysis and Modeling (TAM) (Microsoft) • Pros: Flexible, Build in Threat & Attack Library • Cons: Not updated-supported, DFD require VISIO ™ installation • SDL Threat Modeling (Microsoft) • Pros: Integrated with SDL, Plug-in in issue tracking, free • Cons: Use STRIDE/DREAD not even used my Microsoft • Trike (open source) • Pros: Flexible, automatic threat generation • Cons: Not scalable, not maintained • PTA (commercial) • Pros: factor business impact of assets • Cons: User need to define threats, vulnerabilities and countermeasures Source : http://www.net-security.org/dl/insecure/INSECURE-Mag-17.pdf
Threat Modeler Tool™ Demonstration • Threat Modeler live demo session with myAppSecurityInc (20 minutes) • Develop your threat model con threatModeler ™ with PASTA™ (30 minutes) https://www.youtube.com/watch?v=OZSjS8nu6kE
Q & Q U E S T I O N S A N S W E R S
Thanks for Your Attention Email me : Marco (dot) M (dot) Morana (at) Citi (dot) com Follow me on twitter:@threatmodeling Preorder the book “Application Threat Modeling Book, Wiley-Blackwell” on Amazon http://www.amazon.co.uk/Application-Threat-Modeling-Marco-Morana/dp/0470500964