manage your risk with threatmodeler owasp

39
MyAppSecurity Web: www .myappsecuri ty .com Phone: 201-632-3634 Email: [email protected] Manage Your Risk With Threat Modeling

Upload: ivan-dario-sanchez-moreno

Post on 02-Jun-2018

214 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Manage Your Risk With ThreatModeler OWASP

8/10/2019 Manage Your Risk With ThreatModeler OWASP

http://slidepdf.com/reader/full/manage-your-risk-with-threatmodeler-owasp 1/39

MyAppSecurity

Web: www.myappsecurity.com

Phone: 201-632-3634Email: [email protected]

Manage Your RiskWith Threat

Modeling

Page 2: Manage Your Risk With ThreatModeler OWASP

8/10/2019 Manage Your Risk With ThreatModeler OWASP

http://slidepdf.com/reader/full/manage-your-risk-with-threatmodeler-owasp 2/39

Introduction

Anurag “Archie” Agarwal, CISSP – Founder MyAppSecurity

 – Ex-Director - Education Services, WhiteHat Security

 – 17 years of experience (Cisco, Citigroup, HSBC Bank, etc)

 – Active in WASC and OWASP

 – Published several articles on Secure

Coding and SDL

 –

Project Leader – OWASP Threat Modeling Methodology – http://myappsecurity.blogspot.com

2

Page 3: Manage Your Risk With ThreatModeler OWASP

8/10/2019 Manage Your Risk With ThreatModeler OWASP

http://slidepdf.com/reader/full/manage-your-risk-with-threatmodeler-owasp 3/39

3

• ThreatModeler – Threat Modeling Redefined

• Services

 – Threat Modeling

 – Secure Architecture Review

 – Vulnerability Management

 – Training

Page 4: Manage Your Risk With ThreatModeler OWASP

8/10/2019 Manage Your Risk With ThreatModeler OWASP

http://slidepdf.com/reader/full/manage-your-risk-with-threatmodeler-owasp 4/39

The Changing Threat Landscape

• The threat landscape has changed dramatically in the last 10 years

 – Attackers are financially motivated (e.g. theft of credit card numbers for use

or sale, fraud)

 – New actors are part of organized crime, corporate spies and cyber-terrorist

groups

 – Threats are targeting businesses and where the money is

SOURCE: Cisco: Threat Control and Containment: New Strategies For A Changed Threat Landscape

Page 5: Manage Your Risk With ThreatModeler OWASP

8/10/2019 Manage Your Risk With ThreatModeler OWASP

http://slidepdf.com/reader/full/manage-your-risk-with-threatmodeler-owasp 5/39

“You cannot build secure systems until you

understand your threats”

Page 6: Manage Your Risk With ThreatModeler OWASP

8/10/2019 Manage Your Risk With ThreatModeler OWASP

http://slidepdf.com/reader/full/manage-your-risk-with-threatmodeler-owasp 6/39

Approaches to Threat Modeling

Page 7: Manage Your Risk With ThreatModeler OWASP

8/10/2019 Manage Your Risk With ThreatModeler OWASP

http://slidepdf.com/reader/full/manage-your-risk-with-threatmodeler-owasp 7/39

Asset-Centric Methodology

• Identify how an asset can be compromised

• No specific methodology

Represented as anAttack Tree

Page 8: Manage Your Risk With ThreatModeler OWASP

8/10/2019 Manage Your Risk With ThreatModeler OWASP

http://slidepdf.com/reader/full/manage-your-risk-with-threatmodeler-owasp 8/39

Attacker-Centric Methodology

• Build Attacker Profile

 – Skillset

 – Motivation

 – Attacker Types

• Identify Attack Paths

 – System Vulnerabilities

 –

Network Vulnerabilities – Social Engineering

Page 9: Manage Your Risk With ThreatModeler OWASP

8/10/2019 Manage Your Risk With ThreatModeler OWASP

http://slidepdf.com/reader/full/manage-your-risk-with-threatmodeler-owasp 9/39

System-Centric Methodology

• Has to be addressed in all approaches

• Web/Mobile applications are already being

targeted heavily

• Applications provide access to your assets

with an implicit trust

Applications arethe weakest link

Page 10: Manage Your Risk With ThreatModeler OWASP

8/10/2019 Manage Your Risk With ThreatModeler OWASP

http://slidepdf.com/reader/full/manage-your-risk-with-threatmodeler-owasp 10/39

Microsoft Threat Modeling

• Based on MS model of STRIDE/DREAD

• Not as effective outside of Windows platform

Requires high level of subject matterexpertise

• Time Consuming, Resource

Intensive and Costly

Page 11: Manage Your Risk With ThreatModeler OWASP

8/10/2019 Manage Your Risk With ThreatModeler OWASP

http://slidepdf.com/reader/full/manage-your-risk-with-threatmodeler-owasp 11/39

PASTA™

• PASTA = Process for Attack Simulation and Threat

Analysis

• A seven step process that is applicable to most

application development methodologies• Aligns business objectives with technical requirements.

• Includes compliance requirements, business impact

analysis

• A dynamic approach to threat management,

enumeration and scoring.

Marco Morana

http://securesoftware.blogspot.com/

Page 12: Manage Your Risk With ThreatModeler OWASP

8/10/2019 Manage Your Risk With ThreatModeler OWASP

http://slidepdf.com/reader/full/manage-your-risk-with-threatmodeler-owasp 12/39

The PASTA™ Threat Modeling

Methodology

12

Page 13: Manage Your Risk With ThreatModeler OWASP

8/10/2019 Manage Your Risk With ThreatModeler OWASP

http://slidepdf.com/reader/full/manage-your-risk-with-threatmodeler-owasp 13/39

Page 14: Manage Your Risk With ThreatModeler OWASP

8/10/2019 Manage Your Risk With ThreatModeler OWASP

http://slidepdf.com/reader/full/manage-your-risk-with-threatmodeler-owasp 14/39

Page 15: Manage Your Risk With ThreatModeler OWASP

8/10/2019 Manage Your Risk With ThreatModeler OWASP

http://slidepdf.com/reader/full/manage-your-risk-with-threatmodeler-owasp 15/39

Threat Modeling & Risk Religions

• Numerous risk methodologies

• It’s better to separate threat enumeration

from risk

• Any risk methodology

can be applied to

identified threats

Page 16: Manage Your Risk With ThreatModeler OWASP

8/10/2019 Manage Your Risk With ThreatModeler OWASP

http://slidepdf.com/reader/full/manage-your-risk-with-threatmodeler-owasp 16/39

Application Risk Analysis:

Fundamentals Characterize The Risk Factors:

The Threats (e.g. the cause) Fraudster targeting on-line banking application for data theft and financial gain

The Vulnerability (e.g. the application weakness) Authentication flaws,

Session management vulnerabilities Data confidentiality and integrity vulnerabilities,

Gaps in auditing and logging fraudsters actions and security events

The Technical impact (e.g. breaking security controls) Bypassing authentication with Challenge/Questions, KBA, OTPs

Bypassing customer validations to authorize financial transactions

Tampering web forms for account takeover, Session hijacking/reuse

The Business Impact (e.g. financial loss, fraud, unlawfulcompliance etc) Financial loss due to fraud with un-authorized financial transactions

Reputation loss due to disclosure of breaches of customer data,PII

Lawsuits from businesses victim of business account compromise, un-coveredmoney losses

16

Page 17: Manage Your Risk With ThreatModeler OWASP

8/10/2019 Manage Your Risk With ThreatModeler OWASP

http://slidepdf.com/reader/full/manage-your-risk-with-threatmodeler-owasp 17/39

Threat Modeling Myths

• Threat Modeling cannot work in Agile

environment.

• Time and resource intensive.

• Threat Modeling cannot scale.

Page 18: Manage Your Risk With ThreatModeler OWASP

8/10/2019 Manage Your Risk With ThreatModeler OWASP

http://slidepdf.com/reader/full/manage-your-risk-with-threatmodeler-owasp 18/39

BUILD YOUR OWN SCALABLE

THREAT MODELING PRACTICEIN 7 EASY STEPS

Page 19: Manage Your Risk With ThreatModeler OWASP

8/10/2019 Manage Your Risk With ThreatModeler OWASP

http://slidepdf.com/reader/full/manage-your-risk-with-threatmodeler-owasp 19/39

Step 1 - Threat Library

• Build a comprehensive threat library

 – Existing threat libraries – CAPEC, WASC and OWASP

 – Custom threats/ organization specific threats

• Associate risk with threats to prioritize mitigation efforts

• Other attributes that can be added

 – Technical Impact

 – Business Impact

Page 20: Manage Your Risk With ThreatModeler OWASP

8/10/2019 Manage Your Risk With ThreatModeler OWASP

http://slidepdf.com/reader/full/manage-your-risk-with-threatmodeler-owasp 20/39

ThreatLibrary.com

22

Page 21: Manage Your Risk With ThreatModeler OWASP

8/10/2019 Manage Your Risk With ThreatModeler OWASP

http://slidepdf.com/reader/full/manage-your-risk-with-threatmodeler-owasp 21/39

Step 2 – Security Standards

• Identifying threats is one part of the problem, you need to

mitigate them too.

• Identify mitigation steps

 – Secure Coding Standards

• OWASP Secure Coding Quick Reference Guide

• OWASP Developers Guide

 – Security frameworks

• OWASP ESAPI

• Microsoft Enterprise Library• Microsoft AntiXSS Library

• Custom/Home grown

• Associate mitigation steps with threats

Page 22: Manage Your Risk With ThreatModeler OWASP

8/10/2019 Manage Your Risk With ThreatModeler OWASP

http://slidepdf.com/reader/full/manage-your-risk-with-threatmodeler-owasp 22/39

Threat Mitigation Mapping

24

Page 23: Manage Your Risk With ThreatModeler OWASP

8/10/2019 Manage Your Risk With ThreatModeler OWASP

http://slidepdf.com/reader/full/manage-your-risk-with-threatmodeler-owasp 23/39

Mitigation With Code Samples

25

Page 24: Manage Your Risk With ThreatModeler OWASP

8/10/2019 Manage Your Risk With ThreatModeler OWASP

http://slidepdf.com/reader/full/manage-your-risk-with-threatmodeler-owasp 24/39

Step 3 - Intelligence

• Build a library of reusable Threat Patterns / Attack Trees of

each component.

• Centralized library

• Write Once, Use Anywhere

• Updates get reflected

automatically

• Acts as an abuse case for

developers and QA

Page 25: Manage Your Risk With ThreatModeler OWASP

8/10/2019 Manage Your Risk With ThreatModeler OWASP

http://slidepdf.com/reader/full/manage-your-risk-with-threatmodeler-owasp 25/39

Attack Tree - Registration

27

Page 26: Manage Your Risk With ThreatModeler OWASP

8/10/2019 Manage Your Risk With ThreatModeler OWASP

http://slidepdf.com/reader/full/manage-your-risk-with-threatmodeler-owasp 26/39

Attack Tree - Login

28

Page 27: Manage Your Risk With ThreatModeler OWASP

8/10/2019 Manage Your Risk With ThreatModeler OWASP

http://slidepdf.com/reader/full/manage-your-risk-with-threatmodeler-owasp 27/39

Attack Tree – Wire Transfer

29

Page 28: Manage Your Risk With ThreatModeler OWASP

8/10/2019 Manage Your Risk With ThreatModeler OWASP

http://slidepdf.com/reader/full/manage-your-risk-with-threatmodeler-owasp 28/39

ThreatMap

30

Page 29: Manage Your Risk With ThreatModeler OWASP

8/10/2019 Manage Your Risk With ThreatModeler OWASP

http://slidepdf.com/reader/full/manage-your-risk-with-threatmodeler-owasp 29/39

Write Once, Use Everywhere

Login

Page 30: Manage Your Risk With ThreatModeler OWASP

8/10/2019 Manage Your Risk With ThreatModeler OWASP

http://slidepdf.com/reader/full/manage-your-risk-with-threatmodeler-owasp 30/39

Step 4 - Actionable Output

• Build a comprehensive threat profile (ThreatMap) of the

system which can be either used to understand the system or

generate actionable output

 – High Value Targets

 – Data Flow

 – Negative impact to compliance

 – Security Assessment Checklist

 – Abuse Cases

 –

Threats to individual Components – Risk

 – Attack Trees

Page 31: Manage Your Risk With ThreatModeler OWASP

8/10/2019 Manage Your Risk With ThreatModeler OWASP

http://slidepdf.com/reader/full/manage-your-risk-with-threatmodeler-owasp 31/39

Step 5 –Automate, Integrate,

Collaborate

• Automate the process

• Integrate with your existing workflow

Get various stakeholdersto collaborate

Page 32: Manage Your Risk With ThreatModeler OWASP

8/10/2019 Manage Your Risk With ThreatModeler OWASP

http://slidepdf.com/reader/full/manage-your-risk-with-threatmodeler-owasp 32/39

Integrate

Page 33: Manage Your Risk With ThreatModeler OWASP

8/10/2019 Manage Your Risk With ThreatModeler OWASP

http://slidepdf.com/reader/full/manage-your-risk-with-threatmodeler-owasp 33/39

Collaboration

Architects

• Provide Functional Information about the Application.

Developers

• Implement Correct Mitigation Steps and Security Standards Using Abuse Cases.

Security Team

• Identify Threats And Mitigations.

• Build Reusable Attack Trees.

• Vulnerability Management

Senior Executives

• Risk Management

Page 34: Manage Your Risk With ThreatModeler OWASP

8/10/2019 Manage Your Risk With ThreatModeler OWASP

http://slidepdf.com/reader/full/manage-your-risk-with-threatmodeler-owasp 34/39

Step 6 – Dashboard and Reporting

• Threat Management Console

 – Threat Portfolio

 – Threat Management / Vulnerability Management

 – Prioritize Mitigation

• Risk Dashboard

 – Top Ten Threats

 – Risk Profiling

 – Compliance Portfolio

Page 35: Manage Your Risk With ThreatModeler OWASP

8/10/2019 Manage Your Risk With ThreatModeler OWASP

http://slidepdf.com/reader/full/manage-your-risk-with-threatmodeler-owasp 35/39

Compliance Portfolio

PCI Compliance

Personal Banking PASS

Business Banking FAIL

Credit Card FAIL

Mortgage PASS

Online Trading PASS

Small Business Suite FAIL

Home Loans FAIL

Page 36: Manage Your Risk With ThreatModeler OWASP

8/10/2019 Manage Your Risk With ThreatModeler OWASP

http://slidepdf.com/reader/full/manage-your-risk-with-threatmodeler-owasp 36/39

Threat Portfolio

0%

20%

40%

60%

80%

100%

Banking Mortgage Credit Card Trading

2312 15 10

12 20 14 11

3221 24 16

High Medium Low

Page 37: Manage Your Risk With ThreatModeler OWASP

8/10/2019 Manage Your Risk With ThreatModeler OWASP

http://slidepdf.com/reader/full/manage-your-risk-with-threatmodeler-owasp 37/39

Step 7 - Operationalizing

• Build a Threat Model in hours/days depending on the size of

the application

• Updating a threat model

is a matter of minutes

• Effective Risk Management

• Build reusable templates

• Scalable across thousands of 

applications and various

development, QA and

security teams

Page 38: Manage Your Risk With ThreatModeler OWASP

8/10/2019 Manage Your Risk With ThreatModeler OWASP

http://slidepdf.com/reader/full/manage-your-risk-with-threatmodeler-owasp 38/39

Threat Modeling pays for itself 

•Number of Vulnerabilities = Negligible

• Competitive Advantage

• ROI Benefits

40

“Code fixes performed after release

can result in 30 times the cost of fixes

performed during the design phase.”

(NIST)

Page 39: Manage Your Risk With ThreatModeler OWASP

8/10/2019 Manage Your Risk With ThreatModeler OWASP

http://slidepdf.com/reader/full/manage-your-risk-with-threatmodeler-owasp 39/39

Q&A

Download the copy of this presentation from

http://www.myappsecurity.com or register your name and

email address at our table and we will email it to you.

Anurag Agarwal

MyAppSecurity

http://www.myappsecurity.com

[email protected]

Phone - 201-632-3634