reverse threat modeling

15
Reverse Threat Modeling Maximizing the ROI of Penetration Testing Jerome Athias, March 2014

Upload: jerome-athias

Post on 18-Dec-2014

322 views

Category:

Documents


2 download

DESCRIPTION

Reverse Threat Modeling Maximizing the ROI of Penetration Testing

TRANSCRIPT

Page 1: Reverse Threat Modeling

Reverse Threat Modeling

Maximizing the ROI of Penetration TestingJerome Athias, March 2014

Page 2: Reverse Threat Modeling

Software Security Requirements

Gathering phase of the SDLC (e.g. OWASP ASVS)

Details of implementation: Design phase of the SDLC

=> Software architecture and functionalies

Build security in the code to ensure software assurance (OpenSAMM/BSIMM)

Page 3: Reverse Threat Modeling

Threat Assessment

Did you miss it?

Page 4: Reverse Threat Modeling

Threat ModelingThreat modeling is a procedure for optimizing network security by identifying objectives and vulnerabilities, and then defining countermeasures to prevent, or mitigate the effects of, threats to the system. In this context, a threat is a potential or actual adverse event that may be malicious or incidental, and that can compromise the assets of an enterprise.

References:

https://www.owasp.org/index.php/Application_Threat_Modeling

Threat Modeling: Designing for Security ISBN-13: 978-1118809990

Page 5: Reverse Threat Modeling

Easy to break, hard ($$$) to fix

Paul Mano Official (ISC)2 Guide to the CSSLP CBK, Second Edition

Page 6: Reverse Threat Modeling

Threat Modeling vs. Pentest

Plan: Threat Modeling should be done early to be effective (Waterfall model)“The earlier you find problems, the easier it is to fix them.”

Do

Check: Penetration testing (dynamic analysis) is expensiveVulnerability discovered and exposed in production = too late

Act

Page 7: Reverse Threat Modeling

Iterative process

Threat Models should/can be updated during the life cycle

Page 8: Reverse Threat Modeling

Software Process Improvement and Capability Determination (SPICE)

Reference: itib.netIf you don’t have Threat Models (i.e. Data Flow Diagrams), the war is not lost yet.

Page 9: Reverse Threat Modeling

Penetration Testing

Yes butSANS Critical Security Control 20

“you can’t test quality in”

Penetration testing can be used to validate threat models and/or add a level of confidence in a software.

Pentesting can't replace threat modeling.

Pentesting should be used as an adjunct to threat modeling

Page 10: Reverse Threat Modeling

Professional Penetration

TestingAdvanced technical skills, techniques and tools

+ creativity and innovation

Difference between the true professionals and… those who are not: Project Management, Methodologies and Quality of the deliverables (including reporting)

Page 11: Reverse Threat Modeling

Pentesting Methodologies

Standards, industry effectiveness proven

OWASPhttps://www.owasp.org/index.php/OWASP_Testing_Project

https://www.owasp.org/index.php/Category:OWASP_Application_Security_Verification_Standard_Project

ISECOMOpen Source Security Testing Methodology Manual (OSSTMM)

http://www.isecom.org/research/osstmm.html

Page 12: Reverse Threat Modeling

Vulnerabilities Classification

OWASP Top 10

WASC

CWE/CAPEC (CVE + CVSS)

Proper classification makes security measurable, providing metrics and permits to identify the root cause, helping to enhance the security awareness and training program and SDLC

Page 13: Reverse Threat Modeling

Reverse Threat Modeling

Pentest => Deliverables with classified findings (Report and Data Flow Execution diagram/Mind Map)

=> Update or Creation of the Threat Model

=> Strategy of mitigation/remediation (risk acceptance, security controls)

=> Identification of the root cause (lesson learned, security plan enhancement, prioritizing of the investments)

=> Reduction of the attack surface, better security posture, risk reduced

Page 14: Reverse Threat Modeling

DEMOBuilding a Reverse Threat Model after a Penetration test: approach and tools

Page 15: Reverse Threat Modeling

Questions?Thank you