Title: Understanding the Risk: Threat Modeling for the Enterprise
1Understanding the Risk Threat Modeling for the
Enterprise
- Akshay Aggarwal
- Senior Security Technologist
- akshaya_at_microsoft.com
2Outline
- History of Threat Modeling (TM) at Microsoft-IT
- Target Audience for TM
- Microsoft Application Security TAM
- Threat Model Integration with SDL-IT
- TM Process
- Roles in the TM process
- ACE TM Tool and demo
- Summary
3History of Threat Modeling at Microsoft-IT
- Previous TM tool was based upon book released by
MS in 2004 - Current process is an evolution after 3 years of
using TM - Adapted for specific business needs of IT
enterprises - Focus on components and data
- Implementers of technology
- Product teams building specific technologies use
a different TM process
4Target Audience for TAM Tool
- IT Enterprises wishing to understand and reduce
risk to their environment - Implementers of technology
- Example Developer building smart client on .NET
not team building the framework - ISVs building COTS components
- TM is component based
5Software Application Security
- Penetration Testing
- Attempt to impersonate the adversary and
break-in - Security Code Reviews
- Detect security flaws in code base
- Security Design Reviews
- Detect security flaws in software architecture
- What are we looking for?
6Threat, Attack, Vulnerability Countermeasure
- Threat
- Realized through
- Attacks
- Materialize through
- Vulnerabilities
- Mitigated with
- Countermeasures
Possibility of something bad happening How it
happens (the exploit) Why it happens (the
cause) How to prevent it (the fix)
7 - If it doesnt negatively impact business then
it is not a threat!!
8MAS Threat Analysis Modeling
- Microsoft Application Security Threat Analysis
and Modeling (MAS TAM) - Principle behind threat modeling
- One cant feasibly build a secure system until
one understands the threats against it - Why threat model?
- To identify threats
- Create a security strategy
- TAM provides application risk management
throughout SDLC and beyond!
9What is MAS TAM methodology?
- Threat modeling methodology focused on typical
enterprise IT (LOB) applications - Objective
- Provide a consistent methodology for objectively
identifying and evaluating threats to
applications - Translates technical risk to business impact
- Empower the business to manage risk
- Creates awareness between teams of security
dependencies and assumptions - All without requiring security subject matter
expertise
10Threat Modeling during SDLC
Creation
Assimilation
Signoff
Design
Develop / Purchase
Envision
Test
Release / Sustainment
SDLC
Threat Model / Design Review
Application Entry / Risk Assessment
Post-Production Assessment
Internal Review
Pre-Production Assessment
SDL-IT
Evolutionary Process
11Anatomy of a Threat
Security Team Expertise
- Application Context
- Threats
- Attacks
- Vulnerabilities
- Countermeasures
Application Team Expertise
12Decomposing the Application Context
Components
Roles
Data
13Application Context Rules
- Roles can interact with Components through
defined Actions - Components can interact with Components through
defined Actions - Data is stored inside Components
- Components can Create, Read, Update or Delete
Data - Data can flow between 2 interacting Components
- Data can flow between interacting Role and
Component
14Generating Threats
- Application Context defines allowable actions
- Built by following our application context rules
- Systematic corruption of these actions are
threats - Automatic Threat Generation
- Examples of attacks
- Password Brute Force
- Buffer Overflow
- Canonicalization
- Cross-Site Scripting
- Denial of Service
- Forceful Browsing
- Format-String Attacks
- HTTP Replay Attacks
15Attack Library
- Collection of known Attacks
- Define, with absolute minimal information, the
relationship between - The exploit
- The cause
- The fix
16Threat-Attack Loose Coupling
Security Team Expertise
Application Team Expertise
17Transparency with Attack Library
- Application Context
- Threats
- Attacks
- Vulnerabilities
- Countermeasures
18MAS TAM Benefits
- Benefits for Application Teams
- Translates technical risk to business impact
- Provides a security strategy
- Prioritize security features
- Understand value of countermeasures
- Benefits for Security Team
- More focused Security Assessments
- Translates vulnerabilities to business impact
- Improved Security Awareness
- Bridges the gap between security teams and
application teams
19Threat Modeling Security SME
- Attack Library created by security Subject Matter
Experts (SME) - Verifiable and repeatable
- Security SME provides TM completeness
- Verifies that the threat model meets the
application specifications - Plugs knowledge gaps in the threat model
- New 0-day attack not part of the Attack Library
- Scale out the valuable security experts!!
20MAS Threat Analysis Modeling tool v2.0
- Tool created to aid in the process of creating
and assimilating threat models - Automatic Threat Generation
- Automatic Attack coupling
- Provides a security strategy
- Maintain repository of Threat Models for
analysis - Security landscape is evolving (new attacks,
vulnerabilities, mitigations being introduced)
21Features
- Analytics
- Data Access Control Matrix
- Component Access Control Matrix
- Subject-Object Matrix
- Component Profile
- Visualizations
- Call/Data/Trust Flow
- Attack Surface
- Threat Tree
- Reports
- Risk Owners Report
- Design/Development/Test/Operations Team Report
- Comprehensive Report
22- Microsoft Application Security Threat
Analysis Modeling tool v2.0 Demo
23Application Scenario
- Loan Portal for a 20B financial services company
- Application to approve loans
- Automatic approvals for loans meeting criteria (lt
20k credit score gt700) - Completely online loan lifecycle
- 24 hour response time for all loans
- Separation of duty between agent and approver
24Summary
- Methodology evolved from years of experience
- Focused towards IT enterprises
- Minimizes the impact to existing development
process - Scales the security subject matter expert
- Utilizes already known data points
- Consistent, repeatable and verifiable models
- Change management for application portfolio
- Methodology optimized for SDL-IT integration
25Contact
- ACE service offerings around application
security - Threat Modeling
- Application Security Code Review
- SDL-IT Integration
- Training Threat Modeling and Secure Development
- Contact
- Application Consulting Engineering (ACE)
Services - ACEQues_at_microsoft.com
- Blog http//blogs.msdn.com/ace_team/default.aspx
26QA
27(No Transcript)