Threat Modeling at Symantec Edward Bonver Principal Software Engineer, Symantec Product Security Team [email protected] OWASP WWW, Irvine, CA, January 28, 2011 Threat Modeling at Symantec 1 Sample Agenda 1 What? – Intro & Definitions 2 Who? When? How Often? 3 How? – Not Too Technical Details of the Process 4 A Few Extra Words of Advice 5 Tools OWASP WWW, Irvine, CA, January 28, 2011 Threat Modeling at Symantec 2 Defining Terms - What is a Threat? • Simplest definition: "The adversary's goals, or what an adversary might try to do to a system" • "Threat Modeling" == "Adversary's Goal Modeling" or "Modeling the Adversary's Goals“ OWASP WWW, Irvine, CA, January 28, 2011 Threat Modeling at Symantec Threat Modeling at Symantec 3 What’s Threat Modeling? Threat modeling is a process of assessing and documenting a system’s security risks • Uncover security weaknesses and vulnerabilities • Rank risks • Come up with mitigations • Understand your system better OWASP WWW, Irvine, CA, January 28, 2011 Threat Modeling at Symantec 4 Protecting Your House 5 OWASP WWW, Irvine, CA, January 28, 2011 Threat Modeling at Symantec Thinking Like an Attacker Open Safe Pick Lock Learn Combo Find Written Combo Threaten Cut Open Safe Install Improperly Get Combo from Target Blackmail Evesdrop Bribe AND Listen to Conversation Get Target to State Combo 6 OWASP WWW, Irvine, CA, January 28, 2011 Threat Modeling at Symantec Quality Assurance • Questions: – When do your QA folks engage in a project? – QA team composition – Experience – Environment knowledge • Understand your system better – Test plans & test cases – Requirements OWASP WWW, Irvine, CA, January 28, 2011 Threat Modeling at Symantec 7 Security Requirements… Security Requirements? Security Requirements? Security Requirements! Security Requirements??? Requirements. Add(“…and System Must be Secure!”); OWASP WWW, Irvine, CA, January 28, 2011 Threat Modeling at Symantec 8 A Few Philosophical Thoughts… Threat modeling is like sushi It’s a team activity (see next slide) OWASP WWW, Irvine, CA, January 28, 2011 Threat Modeling at Symantec 9 Roles – Who is Involved • Architects and Developers • QA • Program Managers • Product Managers • Security Experts (Consultants) OWASP WWW, Irvine, CA, January 28, 2011 Threat Modeling at Symantec 10 When to Threat Model? Understanding Implementing Monitoring Security Training Security Goals and Planning Risk Assessment Best Practices Code Analysis Tools (Automation) Security & Penetration Test Fuzz Tests Config Analysis Tools Readiness Review Checkpoint Vulnerability Mgmt OWASP WWW, Irvine, CA, January 28, 2011 Threat Modeling at Symantec 11 Why Threat Models are Effective? • ~50% of all vulnerabilities introduced during the architecture and design phase. • Supported by Common Weakness Enumeration (CWE), from the field OWASP WWW, Irvine, CA, January 28, 2011 Threat Modeling at Symantec Threat Modeling at Symantec 12 Getting There 1. Draw Diagram 2. Analyze Model 3. Calculate Risk 4. Plan Mitigation OWASP WWW, Irvine, CA, January 28, 2011 Threat Modeling at Symantec 13 Draw Diagram Configuration User Data My Process Responses OWASP WWW, Irvine, CA, January 28, 2011 Results Threat Modeling at Symantec Threat Modeling at Symantec 14 Analyze Model S Spoofing T Tampering R I Can an attacker gain access using a false identity? Can an attacker modify data as it flows through the application? Repudiation If an attacker denies an exploit, can you prove him or her wrong? Information disclosure Can an attacker gain access to private or potentially injurious data? D Denial of service E Elevation of privilege Can an attacker crash or reduce the availability of the system? Can an attacker assume the identity of a privileged user? OWASP WWW, Irvine, CA, January 28, 2011 Threat Modeling at Symantec 15 DFD shows possible Effects of Vulnerabilities TID SR External Entity Data flow TID MultiProcess STI DE TID Data Store TID Process STI DE SR TID TID STI DE OWASP WWW, Irvine, CA, January 28, 2011 Threat Modeling at Symantec 16 Calculate Risk • Common Vulnerability Scoring System (CVSSv2) • A rating system that goes from 1-10. • Use the National Vulnerability Database calculator OWASP WWW, Irvine, CA, January 28, 2011 Threat Modeling at Symantec 17 CVSSv2 Calculator Cutting Edge 2010-11: Threat Modeling at Symantec 18 Plan Mitigation • Easy enough • CWE to the rescue OWASP WWW, Irvine, CA, January 28, 2011 Threat Modeling at Symantec 19 Unmitigated Threats Now what? OWASP WWW, Irvine, CA, January 28, 2011 20 Dealing with Risk • Reduce the Risk • Transfer the Risk • Accept the Risk • Reject the Risk 21 OWASP WWW, Irvine, CA, January 28, 2011 Threat Modeling at Symantec Final Considerations • Threat Modeling is an ongoing process • Start small • Revisit Threat Models • Threat models are sensitive documents – Keep them in a safe location with limited team access OWASP WWW, Irvine, CA, January 28, 2011 Threat Modeling at Symantec 22 Documenting All Threats • Threats always exist, live forever • Vulnerabilities exist if there is an unmitigated path to realizing a threat Asset Mitigation Threat Vulnerability OWASP WWW, Irvine, CA, January 28, 2011 Threat Modeling at Symantec 23 Tools • Microsoft SDL Threat Modeling Tool OWASP WWW, Irvine, CA, January 28, 2011 Threat Modeling at Symantec 24 Tools • Excel • Digital Camera • Microsoft Word (or Notepad) • Good Revision System (CVS, Perforce, etc.) OWASP WWW, Irvine, CA, January 28, 2011 Threat Modeling at Symantec 25 Tools • Elevation of Privilege Card Game OWASP WWW, Irvine, CA, January 28, 2011 Threat Modeling at Symantec 26 Thank you! Edward Bonver Principal Software Engineer, Symantec Product Security Team [email protected] OWASP WWW, Irvine, CA, January 28, 2011 Threat Modeling at Symantec 27
© Copyright 2026 Paperzz