Brad Andrews , CISSP, CSSLP
North Texas Cyber Security Conference
2015
 Long time in the tech field
 Wide range of jobs – Defense, Online,
Banking, Airlines, Doc-Com, Medical, etc.
 20+ Years software development experience
 10+ in Information Security
 M.S. and B.S. in Computer Science from the
University of Illinois
 Active Certifications – CISSP, CSSLP, CISM
 Work for one of the largest providers of
pharmacy software and services in the
country
 Serve as Lead Faculty-Area Chair and for
Information Systems Security for the
University of Phoenix Online Campus
 Carry out independent reading and research
for my own company, RBA Communications
The views and opinions expressed in this
session are mine and mine alone. They do
not necessarily represent the opinions of my
employers or anyone associated with
anything!
 Part 1 – Threat Modeling Overview
 Part 2 – Applying STRIDE to a System
 Part 3 – Applying DREAD to a System
 What is It?
 Why is It Important?
 How Do You Do It?
 Flow Diagrams are Important!
 Some Dangers to Avoid
 Figuring out all the significant threats to the
system.
 Microsoft has good guidance
◦ I borrow from Adam Shostack later
 Good overview at
https://www.owasp.org/index.php/Threat_Risk_Modeling
Threat Modeling Lessons from Star Wars (and
Elsewhere)
https://youtu.be/KLpgaoD8ySM
 We need to protect our systems
 Always limited time, people and money
 Must prioritize and focus
 Knowing the most important threats allows
this
 It has had good results
 Not a panacea, just a part of the process
Know the
System
Find Threats
Detail ThreatsRank Threats
Protect Against
Threats
 You need to know system interfaces and data
flows to find out where it could be vulnerable.
 Missing in too many cases!
 Don’t have to be perfect, just good enough.
 Visio may be worthwhile, though even Paint
can be used.
 Trap #1 – You are never done
◦ Ongoing process, but endpoints along the way
 Trap #2 – Monolithic processes
◦ Realize systems have many parts
 Trap #3 – A single way to threat model
◦ Use what works, not just a single formal process
 Trap #4 – Working in a vacuum
◦ All systems interact with other systems, not just
end users.
 Trap #5 – Threat modeling is an innate skill
◦ Some have a better mindset for it, but all can
develop the needed skills
◦ Improvement comes with time and practice
 Trap #6 – Threat modeling is a single skill
◦ Techniques – Know different approaches
◦ Knowledge – Know useful data (threats/risks,
patterns, etc.)
 Trap #7 – Think like an attacker
◦ Limited ability to think outside your own experience
◦ Follow checklists as needed
 Trap #8 – One model to rule them all
◦ Model of the system
◦ Model of the threats
◦ Model of the attacker or user
 Trap #9 – Focus only on the threats
◦ Also consider the impact of requirements, threats
and mitigations
 Trap #10 – Waiting too long
◦ Earlier is almost always better, though review and
repeat as necessary.
 Be Involved
 Don’t Monopolize
 Work Together
Work through an example system
Amazon is a good system to consider since
most have purchased on their site
NTXISSACSC2 - Threat Modeling Part 1 - Overview by Brad Andrews

More Related Content

PPTX
NTXISSACSC2 - Threat Modeling Part 2 - STRIDE by Brad Andrews
PPTX
NTXISSACSC2 - Threat Modeling Part 3 - DREAD by Brad Andrews
PPTX
Application Threat Modeling
PPTX
NTXISSACSC2 - Next-Generation Security and the Problem of Exploitation by Mat...
PPTX
Vulnerability Assessment
PPTX
6 Most Popular Threat Modeling Methodologies
PDF
Application Threat Modeling
PDF
Application Threat Modeling In Risk Management
NTXISSACSC2 - Threat Modeling Part 2 - STRIDE by Brad Andrews
NTXISSACSC2 - Threat Modeling Part 3 - DREAD by Brad Andrews
Application Threat Modeling
NTXISSACSC2 - Next-Generation Security and the Problem of Exploitation by Mat...
Vulnerability Assessment
6 Most Popular Threat Modeling Methodologies
Application Threat Modeling
Application Threat Modeling In Risk Management

What's hot (20)

PPTX
A Brief Introduction to Penetration Testing
PPTX
Cyber Threat Modeling
PPTX
5 things i wish i knew about sast (DSO-LG July 2021)
PPTX
Red Team vs. Blue Team
PPTX
Vulnerability Assessment Presentation
PDF
Rapid Threat Modeling : case study
PDF
Developing a Threat Modeling Mindset
PPTX
NTXISSACSC2 - The Role of Threat Intelligence and Layered Security for Intrus...
PPTX
Secure Design: Threat Modeling
PPTX
Skills that make network security training easy
PPTX
Threat modeling
PPTX
Threat modeling the security of the enterprise
PPTX
NTXISSACSC2 - Top Ten Trends in TRM by Jon Murphy
PPTX
Vulnerability Assesment
PPTX
VAPT - Vulnerability Assessment & Penetration Testing
PDF
Thwarting the Insider Threat: Developing a Robust “Defense in Depth” Data Los...
PDF
Defense In Depth Using NIST 800-30
PPTX
Architecting for Security Resilience
PPTX
NTXISSACSC2 - Kid Proofing the Internet of Things by Monty McDougal
PPT
Layered Approach - Information Security Recommendations
A Brief Introduction to Penetration Testing
Cyber Threat Modeling
5 things i wish i knew about sast (DSO-LG July 2021)
Red Team vs. Blue Team
Vulnerability Assessment Presentation
Rapid Threat Modeling : case study
Developing a Threat Modeling Mindset
NTXISSACSC2 - The Role of Threat Intelligence and Layered Security for Intrus...
Secure Design: Threat Modeling
Skills that make network security training easy
Threat modeling
Threat modeling the security of the enterprise
NTXISSACSC2 - Top Ten Trends in TRM by Jon Murphy
Vulnerability Assesment
VAPT - Vulnerability Assessment & Penetration Testing
Thwarting the Insider Threat: Developing a Robust “Defense in Depth” Data Los...
Defense In Depth Using NIST 800-30
Architecting for Security Resilience
NTXISSACSC2 - Kid Proofing the Internet of Things by Monty McDougal
Layered Approach - Information Security Recommendations
Ad

Viewers also liked (6)

PPT
3 d modeling part 2
PPT
Animation techniques
PPTX
OWASP AppSecCali 2015 - Marshalling Pickles
PPT
Introduction to solid modeling
PPTX
Solid modeling
PPTX
Solid modelling cg
3 d modeling part 2
Animation techniques
OWASP AppSecCali 2015 - Marshalling Pickles
Introduction to solid modeling
Solid modeling
Solid modelling cg
Ad

Similar to NTXISSACSC2 - Threat Modeling Part 1 - Overview by Brad Andrews (20)

PPTX
Security Training: #3 Threat Modelling - Practices and Tools
PDF
Threat Modeling workshop by Robert Hurlbut
PPTX
Threat Modeling And Analysis
PPTX
Threat modelling(system + enterprise)
PDF
Threat Modeling to Reduce Software Security Risk
PPTX
Injecting Threat Modeling into the SDLC by Susan Bradley
PPTX
Threat Modeling-modélisation_de_menaces.pptx
PPT
Application Threat Modeling
PDF
ProdSec: A Technical Approach
PPTX
O'Reilly SACon 2019 - (Continuous) Threat Modeling - What works?
PPTX
Threat Modeling - Locking the Door to Vulnerabilities
PPTX
Security Incident machnism Security Incident machnismSecurity Incident machni...
PPTX
Threat modelling
PDF
Session2-Application Threat Modeling
PPT
Software Security in the Real World
PDF
Secure Design: Threat Modeling
PPTX
Application Security Architecture and Threat Modelling
PDF
Attack modeling vs threat modelling
PPTX
Threat Modeling Web Applications
Security Training: #3 Threat Modelling - Practices and Tools
Threat Modeling workshop by Robert Hurlbut
Threat Modeling And Analysis
Threat modelling(system + enterprise)
Threat Modeling to Reduce Software Security Risk
Injecting Threat Modeling into the SDLC by Susan Bradley
Threat Modeling-modélisation_de_menaces.pptx
Application Threat Modeling
ProdSec: A Technical Approach
O'Reilly SACon 2019 - (Continuous) Threat Modeling - What works?
Threat Modeling - Locking the Door to Vulnerabilities
Security Incident machnism Security Incident machnismSecurity Incident machni...
Threat modelling
Session2-Application Threat Modeling
Software Security in the Real World
Secure Design: Threat Modeling
Application Security Architecture and Threat Modelling
Attack modeling vs threat modelling
Threat Modeling Web Applications

More from North Texas Chapter of the ISSA (20)

PPTX
Purple seven-ntxissacsc5 walcutt
PPTX
Ntxissacsc5 yellow 7 protecting the cloud with cep
PDF
Ntxissacsc5 gold 4 beyond detection and prevension remediation
PPTX
Ntxissacsc5 gold 1 mimecast e mail resiliency
PPTX
Ntxissacsc5 yellow 6-abusing protocols for dynamic addressing in space-jacenr...
PPTX
Ntxissacsc5 yellow 2-evidence driven infosec compliance strategy-garrettp1
PPTX
Ntxissacsc5 yellow 1-beginnerslinux bill-petersen
PDF
Ntxissacsc5 red 6-diy-pentest-lab dustin-dykes
PDF
Ntxissacsc5 red 1 & 2 basic hacking tools ncc group
PPTX
Ntxissacsc5 purple 5-insider threat-_andy_thompson
PPTX
Ntxissacsc5 purple 4-threat detection using machine learning-markszewczul
PPTX
Ntxissacsc5 purple 3-cyber insurance essentials-shawn_tuma.pptx
PPTX
Ntxissacsc5 purple 1-eu-gdpr_patrick_florer
PPTX
Ntxissacsc5 gold 1--mimecast email resiliency- erez-haimowicz
PPTX
Ntxissacsc5 blue 7-zerotrust more effective approach to security-ed higgins
PPTX
Ntxissacsc5 blue 6-securityawareness-laurianna_callaghan
PPTX
Ntxissacsc5 blue 5-holistic approach to cybersecurity-abu_sadeq
PDF
Ntxissacsc5 blue 3-shifting from incident to continuous response bill white
PPTX
Ntxissacsc5 blue 4-the-attack_life_cycle_erich_mueller
PPTX
Ntxissacsc5 blue 2-herding cats and security tools-harold_toomey
Purple seven-ntxissacsc5 walcutt
Ntxissacsc5 yellow 7 protecting the cloud with cep
Ntxissacsc5 gold 4 beyond detection and prevension remediation
Ntxissacsc5 gold 1 mimecast e mail resiliency
Ntxissacsc5 yellow 6-abusing protocols for dynamic addressing in space-jacenr...
Ntxissacsc5 yellow 2-evidence driven infosec compliance strategy-garrettp1
Ntxissacsc5 yellow 1-beginnerslinux bill-petersen
Ntxissacsc5 red 6-diy-pentest-lab dustin-dykes
Ntxissacsc5 red 1 & 2 basic hacking tools ncc group
Ntxissacsc5 purple 5-insider threat-_andy_thompson
Ntxissacsc5 purple 4-threat detection using machine learning-markszewczul
Ntxissacsc5 purple 3-cyber insurance essentials-shawn_tuma.pptx
Ntxissacsc5 purple 1-eu-gdpr_patrick_florer
Ntxissacsc5 gold 1--mimecast email resiliency- erez-haimowicz
Ntxissacsc5 blue 7-zerotrust more effective approach to security-ed higgins
Ntxissacsc5 blue 6-securityawareness-laurianna_callaghan
Ntxissacsc5 blue 5-holistic approach to cybersecurity-abu_sadeq
Ntxissacsc5 blue 3-shifting from incident to continuous response bill white
Ntxissacsc5 blue 4-the-attack_life_cycle_erich_mueller
Ntxissacsc5 blue 2-herding cats and security tools-harold_toomey

Recently uploaded (20)

PPTX
Viva Digitally Software-Defined Wide Area Network.pptx
PPTX
10.2981-wlb.2004.021Figurewlb3bf00068fig0001.pptx
PDF
Lean-Manufacturing-Tools-Techniques-and-How-To-Use-Them.pdf
PDF
Uptota Investor Deck - Where Africa Meets Blockchain
PDF
Computer Networking, Internet, Casting in Network
PDF
BIOCHEM CH2 OVERVIEW OF MICROBIOLOGY.pdf
PDF
Top 8 Trusted Sources to Buy Verified Cash App Accounts.pdf
PPTX
KSS ON CYBERSECURITY INCIDENT RESPONSE AND PLANNING MANAGEMENT.pptx
PPTX
MY PRESENTATION66666666666666666666.pptx
PPTX
Tìm hiểu về dịch vụ FTTH - Fiber Optic Access Node
DOCX
Powerful Ways AIRCONNECT INFOSYSTEMS Pvt Ltd Enhances IT Infrastructure in In...
PPTX
curriculumandpedagogyinearlychildhoodcurriculum-171021103104 - Copy.pptx
PDF
Understand the Gitlab_presentation_task.pdf
PPTX
AI_Cyberattack_Solutions AI AI AI AI .pptx
PDF
Exploring The Internet Of Things(IOT).ppt
PDF
simpleintnettestmetiaerl for the simple testint
PPTX
COPD_Management_Exacerbation_Detailed_Placeholders.pptx
PPTX
最新版美国埃默里大学毕业证(Emory毕业证书)原版定制文凭学历认证
PDF
Buy Cash App Verified Accounts Instantly – Secure Crypto Deal.pdf
PPTX
Basic understanding of cloud computing one need
Viva Digitally Software-Defined Wide Area Network.pptx
10.2981-wlb.2004.021Figurewlb3bf00068fig0001.pptx
Lean-Manufacturing-Tools-Techniques-and-How-To-Use-Them.pdf
Uptota Investor Deck - Where Africa Meets Blockchain
Computer Networking, Internet, Casting in Network
BIOCHEM CH2 OVERVIEW OF MICROBIOLOGY.pdf
Top 8 Trusted Sources to Buy Verified Cash App Accounts.pdf
KSS ON CYBERSECURITY INCIDENT RESPONSE AND PLANNING MANAGEMENT.pptx
MY PRESENTATION66666666666666666666.pptx
Tìm hiểu về dịch vụ FTTH - Fiber Optic Access Node
Powerful Ways AIRCONNECT INFOSYSTEMS Pvt Ltd Enhances IT Infrastructure in In...
curriculumandpedagogyinearlychildhoodcurriculum-171021103104 - Copy.pptx
Understand the Gitlab_presentation_task.pdf
AI_Cyberattack_Solutions AI AI AI AI .pptx
Exploring The Internet Of Things(IOT).ppt
simpleintnettestmetiaerl for the simple testint
COPD_Management_Exacerbation_Detailed_Placeholders.pptx
最新版美国埃默里大学毕业证(Emory毕业证书)原版定制文凭学历认证
Buy Cash App Verified Accounts Instantly – Secure Crypto Deal.pdf
Basic understanding of cloud computing one need

NTXISSACSC2 - Threat Modeling Part 1 - Overview by Brad Andrews

  • 1. Brad Andrews , CISSP, CSSLP North Texas Cyber Security Conference 2015
  • 2.  Long time in the tech field  Wide range of jobs – Defense, Online, Banking, Airlines, Doc-Com, Medical, etc.  20+ Years software development experience  10+ in Information Security  M.S. and B.S. in Computer Science from the University of Illinois  Active Certifications – CISSP, CSSLP, CISM
  • 3.  Work for one of the largest providers of pharmacy software and services in the country  Serve as Lead Faculty-Area Chair and for Information Systems Security for the University of Phoenix Online Campus  Carry out independent reading and research for my own company, RBA Communications
  • 4. The views and opinions expressed in this session are mine and mine alone. They do not necessarily represent the opinions of my employers or anyone associated with anything!
  • 5.  Part 1 – Threat Modeling Overview  Part 2 – Applying STRIDE to a System  Part 3 – Applying DREAD to a System
  • 6.  What is It?  Why is It Important?  How Do You Do It?  Flow Diagrams are Important!  Some Dangers to Avoid
  • 7.  Figuring out all the significant threats to the system.  Microsoft has good guidance ◦ I borrow from Adam Shostack later  Good overview at https://www.owasp.org/index.php/Threat_Risk_Modeling
  • 8. Threat Modeling Lessons from Star Wars (and Elsewhere) https://youtu.be/KLpgaoD8ySM
  • 9.  We need to protect our systems  Always limited time, people and money  Must prioritize and focus  Knowing the most important threats allows this  It has had good results  Not a panacea, just a part of the process
  • 10. Know the System Find Threats Detail ThreatsRank Threats Protect Against Threats
  • 11.  You need to know system interfaces and data flows to find out where it could be vulnerable.  Missing in too many cases!  Don’t have to be perfect, just good enough.  Visio may be worthwhile, though even Paint can be used.
  • 12.  Trap #1 – You are never done ◦ Ongoing process, but endpoints along the way  Trap #2 – Monolithic processes ◦ Realize systems have many parts  Trap #3 – A single way to threat model ◦ Use what works, not just a single formal process  Trap #4 – Working in a vacuum ◦ All systems interact with other systems, not just end users.
  • 13.  Trap #5 – Threat modeling is an innate skill ◦ Some have a better mindset for it, but all can develop the needed skills ◦ Improvement comes with time and practice  Trap #6 – Threat modeling is a single skill ◦ Techniques – Know different approaches ◦ Knowledge – Know useful data (threats/risks, patterns, etc.)  Trap #7 – Think like an attacker ◦ Limited ability to think outside your own experience ◦ Follow checklists as needed
  • 14.  Trap #8 – One model to rule them all ◦ Model of the system ◦ Model of the threats ◦ Model of the attacker or user  Trap #9 – Focus only on the threats ◦ Also consider the impact of requirements, threats and mitigations  Trap #10 – Waiting too long ◦ Earlier is almost always better, though review and repeat as necessary.
  • 15.  Be Involved  Don’t Monopolize  Work Together
  • 16. Work through an example system Amazon is a good system to consider since most have purchased on their site