SlideShare une entreprise Scribd logo
1  sur  45
Télécharger pour lire hors ligne
MARET Consulting | Boulevard Georges Favon 43 | CH 1204 Geneva | Tél +41 22 575 30 35 | info@maret-consulting.ch | www.maret-consulting.ch




        iPad net-Banking Project
       Technical Risk Assessment




                   Sylvain Maret / Security Architect / 2012-05-24
                                     @smaret




                                                                                                                                             Conseil en technologies
Agenda




                   Context

                   Technical Risk Assessment approach
                             A six step process
                             Threat Model – DFD
                             STRIDE Model


                   Open discussion


www.maret-consulting.ch                                  Conseil en technologies
Context

www.maret-consulting.ch             Conseil en technologies
Context




                   Business case: enable customer access to
                    portfolio performance reports from mobile
                    equipments (iPad) located outside the
                    controlled network.
www.maret-consulting.ch                                    Conseil en technologies
Actors        Security Product




              ACME Bank




                               Web Agency
www.maret-consulting.ch                      Conseil en technologies
The TRA relies on a series of six activities:




#1         • System characterization
#2         • Threat identification
#3         • Vulnerabilities identification
#4         • Impacts analysis
#5         • Risk characterization
#6         • Risk treatment and mitigation
 www.maret-consulting.ch                                     Conseil en technologies
Step #1




System characterization
www.maret-consulting.ch             Conseil en technologies
#1 - Appropriate safeguards




                   The selected solution shall implement the
                    appropriate safeguards to maintain the overall
                    security to its expected level.


            Required level



                               C    I     A
www.maret-consulting.ch                                      Conseil en technologies
#1




                   Ensure service integrity:
                             Uncontrolled client systems mean unpredictable
                              request behavior


                   Prevent access from:
                             Offensive / hostile / corrupt requests


www.maret-consulting.ch                                                  Conseil en technologies
#1




                   Ensure information confidentiality:
                             While data travels across uncontrolled networks
                             While the client application is “offline” (turned-off)
                             While the client application is “online” (running)


                   Prevent access from:
                             Network capture:
                                  Sniffers, gateways, cache proxies, MitM, etc.
                             Local capture:
                                  Unsecure backups, memory-card access
                                  Data interception by locally installed malware      Conseil en technologies
www.maret-consulting.ch
#1




                   Consider project specific risks:
                             Outsourced vs. in-house development
                                   where will security assurance come from?


                             Multi-disciplinary project involving three major actors:
                                  The Bank (Acme - IT projects)
                                  The portfolio performance reporting application (Web Agency)
                                  The sandboxing application (Sysmosoft)


                             Who will be responsible for key security aspects?

www.maret-consulting.ch                                                                  Conseil en technologies
Step #2




             Threat identification
www.maret-consulting.ch              Conseil en technologies
#2




                   Building a threat model
                             Decompose the Application
                                  Diagramming - Data Flow Diagram - DFD


                             Determine and Rank Threats
                                  STRIDE model
www.maret-consulting.ch                                                    Conseil en technologies
#2 - Data Flow Diagram (DFD)




                                                                  Process
        External entity               Multiple Process




                Data store                 Data flow     Trust Boundary


www.maret-consulting.ch                                              Conseil en technologies
#2 - DFD - iPad net-Banking




www.maret-consulting.ch                   Conseil en technologies
#2 – STRIDE Model




                          Threat Categories
www.maret-consulting.ch                       Conseil en technologies
#2 - Threat Agents




www.maret-consulting.ch          Conseil en technologies
#2 - Threats - iPad net-Banking - Example




www.maret-consulting.ch                                 Conseil en technologies
#2 - Different threats affect each type of element


         DFD               Threat
                                             Comment                S   T R   I        D E
          ID                 ID


                                       Unsecure backups
          2                           Memory-card access
                            T1
       (iPad)                       Data interception by locally
                                        installed malware

      3
                                     Sniffers, gateways, cache
 (Transport-                T2
                                         proxies, MitM, etc.
  Internet)


      7                             Offensive / hostile / corrupt
                            T3
(Banking- App)                               requests


 www.maret-consulting.ch                                                      Conseil en technologies
Step #3




Vulnerabilities identification
www.maret-consulting.ch             Conseil en technologies
#3 - Security controls - Example

   Threat                              Family                              Controls
     ID
        T1                Feature: local mobile application   Secure offline data storage
                          sandboxing                          Secure online data storage (in-
                                                              memory storage)
                                                              Secure environment validation
                                                              (OS + client application integrity)
                                                              Safeguards against malware
        T2                Feature: data transport security    Confidential transport

        T3                Feature: secure architecture        - defense in depth
                                                              - privilege separation
                                                              - trusted links & endpoint
        T3                Process: secure software            Presence of software security
                          development                         assurance controls in each
                                                              development lifecycle:
                                                              - Outsourced Dev
www.maret-consulting.ch
                                                              - Acme Bank                  Conseil en technologies
#3 - Vulnerabilities identification

Threat                           Controls                V-ID       Vulnerabilities
  ID
 T1            Secure offline data storage               V100              ??
               Secure online data storage (in-memory
               storage)
               Secure environment validation (OS +
               client application integrity)
               Safeguards against malware
 T2            Confidential transport                    V200   No Application Level
                                                                Data Security
 T3            - defense in depth                        V300   No Hardening Strategy
               - privilege separation                           at Service Layer
               - trusted links & endpoint
 T3            Presence of software security assurance   V400   Poor SDLC activities
               controls in each development lifecycle:
               - Outsourced Dev
               - Acme Bank
  www.maret-consulting.ch                                                       Conseil en technologies
#3 - V100 - unknown




                                  Data Sharing between apps ?

                                        Device Jailbreaking ?


                                      Malicious legal App. ?

www.maret-consulting.ch                                  Conseil en technologies
#3 - V200 - No Application Level Data Security




               Banking App


www.maret-consulting.ch                                      Conseil en technologies
#3 - V300 - No Hardening Strategy at Service Layer




                                                 No XML Firewall

                                                 No Mutual Trust SSL at
                                                 WS Transport Level

                                                 No Hardening at OS &
                                                 Service Level




www.maret-consulting.ch                                            Conseil en technologies
#3 - V400 - Poor SDLC activities




SDL de Microsoft
  www.maret-consulting.ch                        Conseil en technologies
#3 - Security Assurance during development

          Project phase           Assurance                 Security
                                  level                     activities
                                                 -Security requirements
                Analysis                         - Compliance reqs., policy


                                                 - Secure design / Design security review
                                                 - Threat model
                  Design                         - Security testing plan

                                                 - Safe APIs
        Implementation                           - Secure coding / defensive programming

                                     ?
                                                 - Automated source code analysis

                                                 - Security testing
             Verification                        - Penetration testing

                                                 - Secure default configuration
                 Delivery                        - Hardening / secure deployment guides
                                                 - Configuration validation

                                                 - Incident response process
             Operations                          - Threat / vulnerability management

www.maret-consulting.ch                                                                Conseil en technologies
#3 – Web Agency: software development security assurance

           Project phase       Assurance                   Security
                               level                       activities

                Analysis

                                                - involvement of a security architect
                                                during the design process
                  Design

                                                - use of automated code quality analysis
        Implementation                          tools



             Verification


                 Delivery

                                                - experience with customers conducting
             Operations                         regular security evaluations
www.maret-consulting.ch                                                                 Conseil en technologies
#3 - Acme Bank: software development security assurance

                                Assurance
           Project phase                                 Security
                                level
                                                         activities

                Analysis


                  Design


        Implementation
                                    ?
             Verification


                 Delivery


             Operations
www.maret-consulting.ch                                               Conseil en technologies
#3 - Software development security assurance: Summary



 Actor                     Assurance                               Conclusions
                           level




                                       - Assurance level is low. Acme Bank shall agree with
Outsourced Dev                         vendor on minimum security assurance requirements along the
                                       project, or establish a clear statement of responsibilities (SLA).



                                       - Assurance level is low. Acme Bank shall define minimum
   Acme Bank                   ?       security assurance requirements with project management.




 www.maret-consulting.ch                                                                    Conseil en technologies
Step #4




                          Impact analysis
www.maret-consulting.ch                     Conseil en technologies
#4 – Impact analysis – Example


V-ID                 Description                        Severity   Exposure


V-100                Information disclosure on iPad      HIGH      Additional controls
                                                                   needed




V-200                Information disclosure on data     MEDIUM Additional controls
                     transport                                 needed

V-300                Intrusion on Banking Application    HIGH      Additional controls
                                                                   needed

V-400                Intrusion on Banking Application    HIGH      Additional controls
                                                                   needed

 www.maret-consulting.ch                                                      Conseil en technologies
Step #5




                          Risk estimation
www.maret-consulting.ch                     Conseil en technologies
#5 – Risk estimation - Example

                             Tech.     Business
R-ID        V-ID                                        Description       Likelihood          Severity
                            Impact      Impact
R-1 V-200 Confidentiality Compliance               Theft of credentials   MEDIUM               HIGH
                          Reputation               or personal data
                                                   during transport
R-2 V-300 Integrity                  Compliance    User input               LOW                HIGH
    V-400                            Reputation,   tampering attempts
                                     Operations    resulting in system
                                                   compromise
R-3 --                        --          --                --                --                     --

R-4 --                        --          --                --                --                     --

R-5

R-6


  www.maret-consulting.ch                                                              Conseil en technologies
Step #6




Risk treatment and mitigation
 www.maret-consulting.ch             Conseil en technologies
#6 – Security controls - Example


                                                                     Reco.
 ID           Risk                      Description                           Decision
                                                                      MC

SC.1 R-1                   Perform a pentest on the iPad           Mitigate
                           application

SC.2 R-1                   Implement Data encryption for transport Mitigate



SC.3 R-2                   Deploy a XML Firewall in front of Web   Mitigate
                           Service

SC.4 R-2                   Perform code review                     Mitigate
                           Perform Pentest


 www.maret-consulting.ch                                                        Conseil en technologies
Conclusion




                   Security in mind during the project

                   Iterative process
                             Risk Assessment during the project
                             Risk Assessment after deployment


                   Threat Modeling
                             A new approach


                   A guideline for all project
www.maret-consulting.ch                                            Conseil en technologies
Questions ?




 www.maret-consulting.ch   Conseil en technologies
Who am I?




                   Security Expert
                             17 years of experience in ICT Security
                             Principal Consultant at MARET Consulting
                             Expert at Engineer School of Yverdon & Geneva University
                             Swiss French Area delegate at OpenID Switzerland
                             Co-founder Geneva Application Security Forum
                             OWASP Member
                             Author of the blog: la Citadelle Electronique
                             http://ch.linkedin.com/in/smaret or @smaret
                             http://www.slideshare.net/smaret


                   Chosen field
                             AppSec & Digital Identity Security
www.maret-consulting.ch                                                                  Conseil en technologies
References




                   https://www.owasp.org/index.php/Application_Threat_
                    Modeling
                   http://msdn.microsoft.com/en-us/library/ff648644.aspx
                   http://en.wikipedia.org/wiki/Threat_model
                   http://www.microsoft.com/security/sdl/default.aspx



                   http://www.appsec-forum.ch/

www.maret-consulting.ch                                            Conseil en technologies
"Le conseil et l'expertise pour le choix et la mise

                     en oeuvre des technologies innovantes dans la sécurité

                          des systèmes d'information et de l'identité numérique"




www.maret-consulting.ch                                                              Conseil en technologies
Backup Slides




www.maret-consulting.ch     Conseil en technologies
#2 - Understanding the threats

Threat                        Property          Definition             Example
Spoofing                      Authentication    Impersonating          Pretending to be any of billg, xbox.com or
                                                something or           a system update
                                                someone else.
Tampering                     Integrity         Modifying data or      Modifying a game config file on disk, or a
                                                code                   packet as it traverses the network

Repudiation                   Non-repudiation   Claiming to have not “I didn’t cheat!”
                                                performed an action

Information                   Confidentiality   Exposing               Reading key material from an app
Disclosure                                      information to
                                                someone not
                                                authorized to see it
Denial of Service             Availability      Deny or degrade        Crashing the web site, sending a packet
                                                service to users       and absorbing seconds of CPU time, or
                                                                       routing packets into a black hole

Elevation of                  Authorization     Gain capabilities      Allowing a remote internet user to run
Privilege                                       without proper         commands is the classic example, but
                                                authorization          running kernel code from lower trust levels
    www.maret-consulting.ch                                            is also EoP                      Conseil en technologies

Source: Microsoft SDL Threat Modeling
#3 - V400 - Poor SDLC activities




 Software assurance maturity models: SAMM (OWASP)


www.maret-consulting.ch                        Conseil en technologies
#2 – Data Flow Diagram




     External                                    Data
                               Process                                Data Store
      entity                                                Flow

• People                    • DLLs               • Function call     • Database
• Other systems             • EXEs               • Network traffic   • File
• Microsoft.com             • Components         • Etc…              • Registry
• etc…                      • Services                               • Shared
                            • Web Services                             Memory
                            • Assemblies                             • Queue/Stack
                            • etc…                                   • etc…


                           Trust Boundary

                            • Process boundary
                            • File system
 www.maret-consulting.ch                                                  Conseil en technologies

Contenu connexe

Tendances

Trend Micro - 13martie2012
Trend Micro - 13martie2012Trend Micro - 13martie2012
Trend Micro - 13martie2012
Agora Group
 
Arrow ECS IBM Partner Jam - Security Update - Vicki Cooper - IBM
Arrow ECS IBM Partner Jam - Security Update - Vicki Cooper - IBMArrow ECS IBM Partner Jam - Security Update - Vicki Cooper - IBM
Arrow ECS IBM Partner Jam - Security Update - Vicki Cooper - IBM
Arrow ECS UK
 
Moving target-defense
Moving target-defenseMoving target-defense
Moving target-defense
Zsolt Nemeth
 
Trend micro real time threat management press presentation
Trend micro real time threat management press presentationTrend micro real time threat management press presentation
Trend micro real time threat management press presentation
Andrew Wong
 
AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...
AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...
AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...
Amazon Web Services
 
SmartCard Forum 2009 - New trends in smart-cards technology
SmartCard Forum 2009 - New trends in smart-cards technologySmartCard Forum 2009 - New trends in smart-cards technology
SmartCard Forum 2009 - New trends in smart-cards technology
OKsystem
 
WP82 Physical Security in Mission Critical Facilities
WP82   Physical Security in Mission Critical FacilitiesWP82   Physical Security in Mission Critical Facilities
WP82 Physical Security in Mission Critical Facilities
SE_NAM_Training
 
DSS ITSEC Conference 2012 - SIEM Q1 Labs IBM Security Systems Intelligence
DSS ITSEC Conference 2012 - SIEM Q1 Labs IBM Security Systems IntelligenceDSS ITSEC Conference 2012 - SIEM Q1 Labs IBM Security Systems Intelligence
DSS ITSEC Conference 2012 - SIEM Q1 Labs IBM Security Systems Intelligence
Andris Soroka
 

Tendances (20)

Trend Micro - 13martie2012
Trend Micro - 13martie2012Trend Micro - 13martie2012
Trend Micro - 13martie2012
 
Targeted Attacks: Have you found yours?
Targeted Attacks: Have you found yours?Targeted Attacks: Have you found yours?
Targeted Attacks: Have you found yours?
 
Trend Micro - Virtualization and Security Compliance
Trend Micro - Virtualization and Security Compliance Trend Micro - Virtualization and Security Compliance
Trend Micro - Virtualization and Security Compliance
 
Arrow ECS IBM Partner Jam - Security Update - Vicki Cooper - IBM
Arrow ECS IBM Partner Jam - Security Update - Vicki Cooper - IBMArrow ECS IBM Partner Jam - Security Update - Vicki Cooper - IBM
Arrow ECS IBM Partner Jam - Security Update - Vicki Cooper - IBM
 
Moving target-defense
Moving target-defenseMoving target-defense
Moving target-defense
 
Security model-of-sip-d2-05 at kishore
Security model-of-sip-d2-05 at kishoreSecurity model-of-sip-d2-05 at kishore
Security model-of-sip-d2-05 at kishore
 
FROM STRATEGY TO ACTION - Vasil Tsvimitidze
FROM STRATEGY TO ACTION - Vasil Tsvimitidze FROM STRATEGY TO ACTION - Vasil Tsvimitidze
FROM STRATEGY TO ACTION - Vasil Tsvimitidze
 
Trend micro real time threat management press presentation
Trend micro real time threat management press presentationTrend micro real time threat management press presentation
Trend micro real time threat management press presentation
 
AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...
AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...
AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...
 
Digital Watermarking Applications and Techniques: A Brief Review
Digital Watermarking Applications and Techniques: A Brief ReviewDigital Watermarking Applications and Techniques: A Brief Review
Digital Watermarking Applications and Techniques: A Brief Review
 
Ehc brochure
Ehc brochureEhc brochure
Ehc brochure
 
SCIT Labs - intrusion tolerant systems
SCIT Labs - intrusion tolerant systemsSCIT Labs - intrusion tolerant systems
SCIT Labs - intrusion tolerant systems
 
SmartCard Forum 2009 - New trends in smart-cards technology
SmartCard Forum 2009 - New trends in smart-cards technologySmartCard Forum 2009 - New trends in smart-cards technology
SmartCard Forum 2009 - New trends in smart-cards technology
 
WP82 Physical Security in Mission Critical Facilities
WP82   Physical Security in Mission Critical FacilitiesWP82   Physical Security in Mission Critical Facilities
WP82 Physical Security in Mission Critical Facilities
 
Info security - mobile approach
Info security -  mobile approachInfo security -  mobile approach
Info security - mobile approach
 
DSS ITSEC Conference 2012 - SIEM Q1 Labs IBM Security Systems Intelligence
DSS ITSEC Conference 2012 - SIEM Q1 Labs IBM Security Systems IntelligenceDSS ITSEC Conference 2012 - SIEM Q1 Labs IBM Security Systems Intelligence
DSS ITSEC Conference 2012 - SIEM Q1 Labs IBM Security Systems Intelligence
 
Digitalwatermarking
DigitalwatermarkingDigitalwatermarking
Digitalwatermarking
 
Retail Stores and Wireless Security—Recommendations
Retail Stores and Wireless Security—RecommendationsRetail Stores and Wireless Security—Recommendations
Retail Stores and Wireless Security—Recommendations
 
DSS ITSEC CONFERENCE - Lumension Security - Intelligent application whiteli...
DSS   ITSEC CONFERENCE - Lumension Security - Intelligent application whiteli...DSS   ITSEC CONFERENCE - Lumension Security - Intelligent application whiteli...
DSS ITSEC CONFERENCE - Lumension Security - Intelligent application whiteli...
 
Apresentação Allen ES
Apresentação Allen ESApresentação Allen ES
Apresentação Allen ES
 

En vedette

Web Application Security
Web Application SecurityWeb Application Security
Web Application Security
Abdul Wahid
 
Application Threat Modeling
Application Threat ModelingApplication Threat Modeling
Application Threat Modeling
Marco Morana
 

En vedette (12)

Bridging the Social Media Implementation/Audit Gap
Bridging the Social Media Implementation/Audit GapBridging the Social Media Implementation/Audit Gap
Bridging the Social Media Implementation/Audit Gap
 
Application Threat Modeling
Application Threat ModelingApplication Threat Modeling
Application Threat Modeling
 
STRIDE And DREAD
STRIDE And DREADSTRIDE And DREAD
STRIDE And DREAD
 
Domain-specific Modeling and Code Generation for Cross-platform Mobile and Io...
Domain-specific Modeling and Code Generation for Cross-platform Mobile and Io...Domain-specific Modeling and Code Generation for Cross-platform Mobile and Io...
Domain-specific Modeling and Code Generation for Cross-platform Mobile and Io...
 
7 Steps to Threat Modeling
7 Steps to Threat Modeling7 Steps to Threat Modeling
7 Steps to Threat Modeling
 
Threat modeling web application: a case study
Threat modeling web application: a case studyThreat modeling web application: a case study
Threat modeling web application: a case study
 
Securing Mobile Banking Apps - You Are Only as Strong as Your Weakest Link
Securing Mobile Banking Apps - You Are Only as Strong as Your Weakest LinkSecuring Mobile Banking Apps - You Are Only as Strong as Your Weakest Link
Securing Mobile Banking Apps - You Are Only as Strong as Your Weakest Link
 
Web Application Security
Web Application SecurityWeb Application Security
Web Application Security
 
Attacking and Defending Mobile Applications
Attacking and Defending Mobile ApplicationsAttacking and Defending Mobile Applications
Attacking and Defending Mobile Applications
 
Application Threat Modeling
Application Threat ModelingApplication Threat Modeling
Application Threat Modeling
 
Real World Application Threat Modelling By Example
Real World Application Threat Modelling By ExampleReal World Application Threat Modelling By Example
Real World Application Threat Modelling By Example
 
Secure Design: Threat Modeling
Secure Design: Threat ModelingSecure Design: Threat Modeling
Secure Design: Threat Modeling
 

Similaire à Threat Modeling / iPad

Mobile Commerce: A Security Perspective
Mobile Commerce: A Security PerspectiveMobile Commerce: A Security Perspective
Mobile Commerce: A Security Perspective
Pragati Rai
 
FrontOne our new and different solutions
FrontOne our new and different solutionsFrontOne our new and different solutions
FrontOne our new and different solutions
frontone
 
E-commerce & Security
E-commerce & SecurityE-commerce & Security
E-commerce & Security
NetstarterSL
 
Confoo 2012 - Web security keynote
Confoo 2012 - Web security keynoteConfoo 2012 - Web security keynote
Confoo 2012 - Web security keynote
Antonio Fontes
 
The Cyber Security Landscape: An OurCrowd Briefing for Investors
The Cyber Security Landscape: An OurCrowd Briefing for InvestorsThe Cyber Security Landscape: An OurCrowd Briefing for Investors
The Cyber Security Landscape: An OurCrowd Briefing for Investors
OurCrowd
 

Similaire à Threat Modeling / iPad (20)

PCTY 2012, IBM Security and Strategy v. Fabio Panada
PCTY 2012, IBM Security and Strategy v. Fabio PanadaPCTY 2012, IBM Security and Strategy v. Fabio Panada
PCTY 2012, IBM Security and Strategy v. Fabio Panada
 
Mobile Commerce: A Security Perspective
Mobile Commerce: A Security PerspectiveMobile Commerce: A Security Perspective
Mobile Commerce: A Security Perspective
 
Cyber risks in supply chains
Cyber risks in supply chains Cyber risks in supply chains
Cyber risks in supply chains
 
FrontOne our new and different solutions
FrontOne our new and different solutionsFrontOne our new and different solutions
FrontOne our new and different solutions
 
So You Want a Job in Cybersecurity
So You Want a Job in CybersecuritySo You Want a Job in Cybersecurity
So You Want a Job in Cybersecurity
 
cybersecurity-careers.pdf
cybersecurity-careers.pdfcybersecurity-careers.pdf
cybersecurity-careers.pdf
 
Evolutionary ATM & Cyber Security - Selex ES - Angeloluca Barba
Evolutionary ATM & Cyber Security - Selex ES - Angeloluca BarbaEvolutionary ATM & Cyber Security - Selex ES - Angeloluca Barba
Evolutionary ATM & Cyber Security - Selex ES - Angeloluca Barba
 
Threat Modeling Web Applications
Threat Modeling Web ApplicationsThreat Modeling Web Applications
Threat Modeling Web Applications
 
E-commerce & Security
E-commerce & SecurityE-commerce & Security
E-commerce & Security
 
M I Dentity 3 G 040111
M I Dentity 3 G 040111M I Dentity 3 G 040111
M I Dentity 3 G 040111
 
Implications of GDPR for IoT Big Data Security and Privacy Fabric
Implications of GDPR for IoT Big Data Security and Privacy FabricImplications of GDPR for IoT Big Data Security and Privacy Fabric
Implications of GDPR for IoT Big Data Security and Privacy Fabric
 
Insecure magazine - 52
Insecure magazine - 52Insecure magazine - 52
Insecure magazine - 52
 
Irdeto Spokesman Yuan Xiang Gu Speaks At ISI SSP Beijing 2011
Irdeto Spokesman Yuan Xiang Gu Speaks At ISI SSP Beijing 2011Irdeto Spokesman Yuan Xiang Gu Speaks At ISI SSP Beijing 2011
Irdeto Spokesman Yuan Xiang Gu Speaks At ISI SSP Beijing 2011
 
Dubai Cyber Security 01 Ics Scada Cyber Security Solutions and Challenges...
Dubai Cyber Security   01   Ics Scada Cyber Security Solutions and Challenges...Dubai Cyber Security   01   Ics Scada Cyber Security Solutions and Challenges...
Dubai Cyber Security 01 Ics Scada Cyber Security Solutions and Challenges...
 
Confoo 2012 - Web security keynote
Confoo 2012 - Web security keynoteConfoo 2012 - Web security keynote
Confoo 2012 - Web security keynote
 
The Cyber Security Landscape: An OurCrowd Briefing for Investors
The Cyber Security Landscape: An OurCrowd Briefing for InvestorsThe Cyber Security Landscape: An OurCrowd Briefing for Investors
The Cyber Security Landscape: An OurCrowd Briefing for Investors
 
טכנולוגיות אבטחת מערכות מידע
טכנולוגיות אבטחת מערכות מידעטכנולוגיות אבטחת מערכות מידע
טכנולוגיות אבטחת מערכות מידע
 
Hawaii Pacific GIS Conference 2012: Disaster Management and Emergency Respons...
Hawaii Pacific GIS Conference 2012: Disaster Management and Emergency Respons...Hawaii Pacific GIS Conference 2012: Disaster Management and Emergency Respons...
Hawaii Pacific GIS Conference 2012: Disaster Management and Emergency Respons...
 
Ot ics cyberattaques dans les organisations industrielles
Ot ics cyberattaques dans les organisations industrielles Ot ics cyberattaques dans les organisations industrielles
Ot ics cyberattaques dans les organisations industrielles
 
#OSSPARIS19 : The evolving (IoT) security landscape - Gianluca Varisco, Arduino
#OSSPARIS19 : The evolving (IoT) security landscape - Gianluca Varisco, Arduino#OSSPARIS19 : The evolving (IoT) security landscape - Gianluca Varisco, Arduino
#OSSPARIS19 : The evolving (IoT) security landscape - Gianluca Varisco, Arduino
 

Plus de Sylvain Maret

Air Navigation Service Providers - Unsecurity on Voice over IP Radion
Air Navigation Service Providers - Unsecurity on Voice over IP RadionAir Navigation Service Providers - Unsecurity on Voice over IP Radion
Air Navigation Service Providers - Unsecurity on Voice over IP Radion
Sylvain Maret
 
factsheet_4g_critical_comm_en_vl
factsheet_4g_critical_comm_en_vlfactsheet_4g_critical_comm_en_vl
factsheet_4g_critical_comm_en_vl
Sylvain Maret
 
Securite des Web Services (SOAP vs REST) / OWASP Geneva dec. 2012
Securite des Web Services (SOAP vs REST) / OWASP Geneva dec. 2012Securite des Web Services (SOAP vs REST) / OWASP Geneva dec. 2012
Securite des Web Services (SOAP vs REST) / OWASP Geneva dec. 2012
Sylvain Maret
 
Strong Authentication State of the Art 2012 / Sarajevo CSO
Strong Authentication State of the Art 2012 / Sarajevo CSOStrong Authentication State of the Art 2012 / Sarajevo CSO
Strong Authentication State of the Art 2012 / Sarajevo CSO
Sylvain Maret
 
Geneva Application Security Forum: Vers une authentification plus forte dans ...
Geneva Application Security Forum: Vers une authentification plus forte dans ...Geneva Application Security Forum: Vers une authentification plus forte dans ...
Geneva Application Security Forum: Vers une authentification plus forte dans ...
Sylvain Maret
 
Geneva Application Security Forum: Vers une authentification plus forte dans ...
Geneva Application Security Forum: Vers une authentification plus forte dans ...Geneva Application Security Forum: Vers une authentification plus forte dans ...
Geneva Application Security Forum: Vers une authentification plus forte dans ...
Sylvain Maret
 
Geneva Application Security Forum: Vers une authentification plus forte dans ...
Geneva Application Security Forum: Vers une authentification plus forte dans ...Geneva Application Security Forum: Vers une authentification plus forte dans ...
Geneva Application Security Forum: Vers une authentification plus forte dans ...
Sylvain Maret
 

Plus de Sylvain Maret (20)

Air Navigation Service Providers - Unsecurity on Voice over IP Radion
Air Navigation Service Providers - Unsecurity on Voice over IP RadionAir Navigation Service Providers - Unsecurity on Voice over IP Radion
Air Navigation Service Providers - Unsecurity on Voice over IP Radion
 
factsheet_4g_critical_comm_en_vl
factsheet_4g_critical_comm_en_vlfactsheet_4g_critical_comm_en_vl
factsheet_4g_critical_comm_en_vl
 
INA Volume 1/3 Version 1.02 Released / Digital Identity and Authentication
INA Volume 1/3 Version 1.02 Released / Digital Identity and AuthenticationINA Volume 1/3 Version 1.02 Released / Digital Identity and Authentication
INA Volume 1/3 Version 1.02 Released / Digital Identity and Authentication
 
INA Volume 1/3 Version 1.0 Released / Digital Identity and Authentication
INA Volume 1/3 Version 1.0 Released / Digital Identity and AuthenticationINA Volume 1/3 Version 1.0 Released / Digital Identity and Authentication
INA Volume 1/3 Version 1.0 Released / Digital Identity and Authentication
 
INA Volume 1/3 Version 1.0 RC / Digital Identity and Authentication
INA Volume 1/3 Version 1.0 RC / Digital Identity and AuthenticationINA Volume 1/3 Version 1.0 RC / Digital Identity and Authentication
INA Volume 1/3 Version 1.0 RC / Digital Identity and Authentication
 
Securite des Web Services (SOAP vs REST) / OWASP Geneva dec. 2012
Securite des Web Services (SOAP vs REST) / OWASP Geneva dec. 2012Securite des Web Services (SOAP vs REST) / OWASP Geneva dec. 2012
Securite des Web Services (SOAP vs REST) / OWASP Geneva dec. 2012
 
Strong Authentication State of the Art 2012 / Sarajevo CSO
Strong Authentication State of the Art 2012 / Sarajevo CSOStrong Authentication State of the Art 2012 / Sarajevo CSO
Strong Authentication State of the Art 2012 / Sarajevo CSO
 
ASFWS 2012 / Initiation à la sécurité des Web Services par Sylvain Maret
ASFWS 2012 / Initiation à la sécurité des Web Services par Sylvain MaretASFWS 2012 / Initiation à la sécurité des Web Services par Sylvain Maret
ASFWS 2012 / Initiation à la sécurité des Web Services par Sylvain Maret
 
Strong Authentication in Web Application #SCS III
Strong Authentication in Web Application #SCS IIIStrong Authentication in Web Application #SCS III
Strong Authentication in Web Application #SCS III
 
Strong Authentication in Web Applications: State of the Art 2011
Strong Authentication in Web Applications: State of the Art 2011Strong Authentication in Web Applications: State of the Art 2011
Strong Authentication in Web Applications: State of the Art 2011
 
Strong Authentication in Web Application / ConFoo.ca 2011
Strong Authentication in Web Application / ConFoo.ca 2011Strong Authentication in Web Application / ConFoo.ca 2011
Strong Authentication in Web Application / ConFoo.ca 2011
 
Authentication and strong authentication for Web Application
Authentication and strong authentication for Web ApplicationAuthentication and strong authentication for Web Application
Authentication and strong authentication for Web Application
 
Geneva Application Security Forum 2010
Geneva Application Security Forum 2010Geneva Application Security Forum 2010
Geneva Application Security Forum 2010
 
Final conclusions of Working Group 3 at Workshop Münchenwiler 20-21 of May 20...
Final conclusions of Working Group 3 at Workshop Münchenwiler 20-21 of May 20...Final conclusions of Working Group 3 at Workshop Münchenwiler 20-21 of May 20...
Final conclusions of Working Group 3 at Workshop Münchenwiler 20-21 of May 20...
 
Comment protéger de façon efficace son/ses identité(s) numérique(s) sur le We...
Comment protéger de façon efficace son/ses identité(s) numérique(s) sur le We...Comment protéger de façon efficace son/ses identité(s) numérique(s) sur le We...
Comment protéger de façon efficace son/ses identité(s) numérique(s) sur le We...
 
Digital identity trust & confidence
Digital identity trust & confidenceDigital identity trust & confidence
Digital identity trust & confidence
 
Implementation of a Biometric Solution Providing Strong Authentication To Gai...
Implementation of a Biometric Solution Providing Strong Authentication To Gai...Implementation of a Biometric Solution Providing Strong Authentication To Gai...
Implementation of a Biometric Solution Providing Strong Authentication To Gai...
 
Geneva Application Security Forum: Vers une authentification plus forte dans ...
Geneva Application Security Forum: Vers une authentification plus forte dans ...Geneva Application Security Forum: Vers une authentification plus forte dans ...
Geneva Application Security Forum: Vers une authentification plus forte dans ...
 
Geneva Application Security Forum: Vers une authentification plus forte dans ...
Geneva Application Security Forum: Vers une authentification plus forte dans ...Geneva Application Security Forum: Vers une authentification plus forte dans ...
Geneva Application Security Forum: Vers une authentification plus forte dans ...
 
Geneva Application Security Forum: Vers une authentification plus forte dans ...
Geneva Application Security Forum: Vers une authentification plus forte dans ...Geneva Application Security Forum: Vers une authentification plus forte dans ...
Geneva Application Security Forum: Vers une authentification plus forte dans ...
 

Dernier

IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
Enterprise Knowledge
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
vu2urc
 

Dernier (20)

How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Evaluating the top large language models.pdf
Evaluating the top large language models.pdfEvaluating the top large language models.pdf
Evaluating the top large language models.pdf
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 

Threat Modeling / iPad

  • 1. MARET Consulting | Boulevard Georges Favon 43 | CH 1204 Geneva | Tél +41 22 575 30 35 | info@maret-consulting.ch | www.maret-consulting.ch iPad net-Banking Project Technical Risk Assessment Sylvain Maret / Security Architect / 2012-05-24 @smaret Conseil en technologies
  • 2. Agenda  Context  Technical Risk Assessment approach  A six step process  Threat Model – DFD  STRIDE Model  Open discussion www.maret-consulting.ch Conseil en technologies
  • 3. Context www.maret-consulting.ch Conseil en technologies
  • 4. Context  Business case: enable customer access to portfolio performance reports from mobile equipments (iPad) located outside the controlled network. www.maret-consulting.ch Conseil en technologies
  • 5. Actors Security Product ACME Bank Web Agency www.maret-consulting.ch Conseil en technologies
  • 6. The TRA relies on a series of six activities: #1 • System characterization #2 • Threat identification #3 • Vulnerabilities identification #4 • Impacts analysis #5 • Risk characterization #6 • Risk treatment and mitigation www.maret-consulting.ch Conseil en technologies
  • 8. #1 - Appropriate safeguards  The selected solution shall implement the appropriate safeguards to maintain the overall security to its expected level. Required level C I A www.maret-consulting.ch Conseil en technologies
  • 9. #1  Ensure service integrity:  Uncontrolled client systems mean unpredictable request behavior  Prevent access from:  Offensive / hostile / corrupt requests www.maret-consulting.ch Conseil en technologies
  • 10. #1  Ensure information confidentiality:  While data travels across uncontrolled networks  While the client application is “offline” (turned-off)  While the client application is “online” (running)  Prevent access from:  Network capture:  Sniffers, gateways, cache proxies, MitM, etc.  Local capture:  Unsecure backups, memory-card access  Data interception by locally installed malware Conseil en technologies www.maret-consulting.ch
  • 11. #1  Consider project specific risks:  Outsourced vs. in-house development   where will security assurance come from?  Multi-disciplinary project involving three major actors:  The Bank (Acme - IT projects)  The portfolio performance reporting application (Web Agency)  The sandboxing application (Sysmosoft)  Who will be responsible for key security aspects? www.maret-consulting.ch Conseil en technologies
  • 12. Step #2 Threat identification www.maret-consulting.ch Conseil en technologies
  • 13. #2  Building a threat model  Decompose the Application  Diagramming - Data Flow Diagram - DFD  Determine and Rank Threats  STRIDE model www.maret-consulting.ch Conseil en technologies
  • 14. #2 - Data Flow Diagram (DFD) Process External entity Multiple Process Data store Data flow Trust Boundary www.maret-consulting.ch Conseil en technologies
  • 15. #2 - DFD - iPad net-Banking www.maret-consulting.ch Conseil en technologies
  • 16. #2 – STRIDE Model Threat Categories www.maret-consulting.ch Conseil en technologies
  • 17. #2 - Threat Agents www.maret-consulting.ch Conseil en technologies
  • 18. #2 - Threats - iPad net-Banking - Example www.maret-consulting.ch Conseil en technologies
  • 19. #2 - Different threats affect each type of element DFD Threat Comment S T R I D E ID ID Unsecure backups 2 Memory-card access T1 (iPad) Data interception by locally installed malware 3 Sniffers, gateways, cache (Transport- T2 proxies, MitM, etc. Internet) 7 Offensive / hostile / corrupt T3 (Banking- App) requests www.maret-consulting.ch Conseil en technologies
  • 21. #3 - Security controls - Example Threat Family Controls ID T1 Feature: local mobile application Secure offline data storage sandboxing Secure online data storage (in- memory storage) Secure environment validation (OS + client application integrity) Safeguards against malware T2 Feature: data transport security Confidential transport T3 Feature: secure architecture - defense in depth - privilege separation - trusted links & endpoint T3 Process: secure software Presence of software security development assurance controls in each development lifecycle: - Outsourced Dev www.maret-consulting.ch - Acme Bank Conseil en technologies
  • 22. #3 - Vulnerabilities identification Threat Controls V-ID Vulnerabilities ID T1 Secure offline data storage V100 ?? Secure online data storage (in-memory storage) Secure environment validation (OS + client application integrity) Safeguards against malware T2 Confidential transport V200 No Application Level Data Security T3 - defense in depth V300 No Hardening Strategy - privilege separation at Service Layer - trusted links & endpoint T3 Presence of software security assurance V400 Poor SDLC activities controls in each development lifecycle: - Outsourced Dev - Acme Bank www.maret-consulting.ch Conseil en technologies
  • 23. #3 - V100 - unknown Data Sharing between apps ? Device Jailbreaking ? Malicious legal App. ? www.maret-consulting.ch Conseil en technologies
  • 24. #3 - V200 - No Application Level Data Security Banking App www.maret-consulting.ch Conseil en technologies
  • 25. #3 - V300 - No Hardening Strategy at Service Layer No XML Firewall No Mutual Trust SSL at WS Transport Level No Hardening at OS & Service Level www.maret-consulting.ch Conseil en technologies
  • 26. #3 - V400 - Poor SDLC activities SDL de Microsoft www.maret-consulting.ch Conseil en technologies
  • 27. #3 - Security Assurance during development Project phase Assurance Security level activities -Security requirements Analysis - Compliance reqs., policy - Secure design / Design security review - Threat model Design - Security testing plan - Safe APIs Implementation - Secure coding / defensive programming ? - Automated source code analysis - Security testing Verification - Penetration testing - Secure default configuration Delivery - Hardening / secure deployment guides - Configuration validation - Incident response process Operations - Threat / vulnerability management www.maret-consulting.ch Conseil en technologies
  • 28. #3 – Web Agency: software development security assurance Project phase Assurance Security level activities Analysis - involvement of a security architect during the design process Design - use of automated code quality analysis Implementation tools Verification Delivery - experience with customers conducting Operations regular security evaluations www.maret-consulting.ch Conseil en technologies
  • 29. #3 - Acme Bank: software development security assurance Assurance Project phase Security level activities Analysis Design Implementation ? Verification Delivery Operations www.maret-consulting.ch Conseil en technologies
  • 30. #3 - Software development security assurance: Summary Actor Assurance Conclusions level - Assurance level is low. Acme Bank shall agree with Outsourced Dev vendor on minimum security assurance requirements along the project, or establish a clear statement of responsibilities (SLA). - Assurance level is low. Acme Bank shall define minimum Acme Bank ? security assurance requirements with project management. www.maret-consulting.ch Conseil en technologies
  • 31. Step #4 Impact analysis www.maret-consulting.ch Conseil en technologies
  • 32. #4 – Impact analysis – Example V-ID Description Severity Exposure V-100 Information disclosure on iPad HIGH Additional controls needed V-200 Information disclosure on data MEDIUM Additional controls transport needed V-300 Intrusion on Banking Application HIGH Additional controls needed V-400 Intrusion on Banking Application HIGH Additional controls needed www.maret-consulting.ch Conseil en technologies
  • 33. Step #5 Risk estimation www.maret-consulting.ch Conseil en technologies
  • 34. #5 – Risk estimation - Example Tech. Business R-ID V-ID Description Likelihood Severity Impact Impact R-1 V-200 Confidentiality Compliance Theft of credentials MEDIUM HIGH Reputation or personal data during transport R-2 V-300 Integrity Compliance User input LOW HIGH V-400 Reputation, tampering attempts Operations resulting in system compromise R-3 -- -- -- -- -- -- R-4 -- -- -- -- -- -- R-5 R-6 www.maret-consulting.ch Conseil en technologies
  • 35. Step #6 Risk treatment and mitigation www.maret-consulting.ch Conseil en technologies
  • 36. #6 – Security controls - Example Reco. ID Risk Description Decision MC SC.1 R-1 Perform a pentest on the iPad Mitigate application SC.2 R-1 Implement Data encryption for transport Mitigate SC.3 R-2 Deploy a XML Firewall in front of Web Mitigate Service SC.4 R-2 Perform code review Mitigate Perform Pentest www.maret-consulting.ch Conseil en technologies
  • 37. Conclusion  Security in mind during the project  Iterative process  Risk Assessment during the project  Risk Assessment after deployment  Threat Modeling  A new approach  A guideline for all project www.maret-consulting.ch Conseil en technologies
  • 38. Questions ? www.maret-consulting.ch Conseil en technologies
  • 39. Who am I?  Security Expert  17 years of experience in ICT Security  Principal Consultant at MARET Consulting  Expert at Engineer School of Yverdon & Geneva University  Swiss French Area delegate at OpenID Switzerland  Co-founder Geneva Application Security Forum  OWASP Member  Author of the blog: la Citadelle Electronique  http://ch.linkedin.com/in/smaret or @smaret  http://www.slideshare.net/smaret  Chosen field  AppSec & Digital Identity Security www.maret-consulting.ch Conseil en technologies
  • 40. References  https://www.owasp.org/index.php/Application_Threat_ Modeling  http://msdn.microsoft.com/en-us/library/ff648644.aspx  http://en.wikipedia.org/wiki/Threat_model  http://www.microsoft.com/security/sdl/default.aspx  http://www.appsec-forum.ch/ www.maret-consulting.ch Conseil en technologies
  • 41. "Le conseil et l'expertise pour le choix et la mise en oeuvre des technologies innovantes dans la sécurité des systèmes d'information et de l'identité numérique" www.maret-consulting.ch Conseil en technologies
  • 42. Backup Slides www.maret-consulting.ch Conseil en technologies
  • 43. #2 - Understanding the threats Threat Property Definition Example Spoofing Authentication Impersonating Pretending to be any of billg, xbox.com or something or a system update someone else. Tampering Integrity Modifying data or Modifying a game config file on disk, or a code packet as it traverses the network Repudiation Non-repudiation Claiming to have not “I didn’t cheat!” performed an action Information Confidentiality Exposing Reading key material from an app Disclosure information to someone not authorized to see it Denial of Service Availability Deny or degrade Crashing the web site, sending a packet service to users and absorbing seconds of CPU time, or routing packets into a black hole Elevation of Authorization Gain capabilities Allowing a remote internet user to run Privilege without proper commands is the classic example, but authorization running kernel code from lower trust levels www.maret-consulting.ch is also EoP Conseil en technologies Source: Microsoft SDL Threat Modeling
  • 44. #3 - V400 - Poor SDLC activities Software assurance maturity models: SAMM (OWASP) www.maret-consulting.ch Conseil en technologies
  • 45. #2 – Data Flow Diagram External Data Process Data Store entity Flow • People • DLLs • Function call • Database • Other systems • EXEs • Network traffic • File • Microsoft.com • Components • Etc… • Registry • etc… • Services • Shared • Web Services Memory • Assemblies • Queue/Stack • etc… • etc… Trust Boundary • Process boundary • File system www.maret-consulting.ch Conseil en technologies