ISOL 536 Security Architecture and Design

Threat Modeling Session 12a

Threat Modeling & Security Requirements

Agenda

• Interplay of threats and requirements • Requirements

– Business & Scenarios – Prevent/Detect/Respond – Compliance – Privacy – STRIDE

• Non-Requirements

• Reading: Chapter 12

Interplay of Attacks, Mitigations and Requirements

Requirements

Threats Mitigations

Requirements drive threats

Threats expose requirements

Un-mitigatable threats drive requirements

Threats need mitigation

Mitigations can be bypassed

1

2

3

4

5

6

Framing Requirements

• Important threats violate important requirements

• Crisp requirements help determine if something violates

– Thought-provoking: “A program that hasn’t been fully specified cannot be buggy, merely surprising.”

– Full specification is exceptionally rare

– Bugs are not rare

• Crisp requirements are hard

• Requirements often change as you learn more

• So getting “good enough” quickly is a useful goal

Cookbook Approach

• Chapter 12 is full of lists such as: – Anyone with an email address can create an account

– Anyone with a validated email address can create an account

– Anyone with a credit card number can create an account

– Anyone with a valid, authorizable credit card can create an account

– Anyone who can tell us how much we charged their credit card can …

• Intended to provoke consideration/conversation

• Many are incomplete, requiring scoping or customization

REQUIREMENTS

Business & Scenarios

• Scenario driven

– Use cases are a general approach to requirements

– Rare for security to show up in use cases, even as a feature

• Industry

– PCI-DSS, medical, other “verticals” impose requirements

• Competition

– One place it’s possible to get more crisp

Prevent/Detect/Respond (1/3)

• A common way of framing security problems

• Can lead to some interesting requirements for both development and operations

• Prevent

– Isolation (firewalls, air gaps)

– Least-privilege (sandboxing, running unprivileged)

– Vulnerability management

Prevent: Vulnerability Management (2/3)

• Vulnerabilities refer to code bugs which can be exploited leading to attacker code running

• Track vulnerabilities in code you depend on

– Operationally to patch

– Developmentally to integrate security fixes & ship updates

• Make it easy for others to report vulnerabilities to you

Detect/Respond (3/3)

• Operational Detection – Set goals for detection

– Use penetration testing, “Indicators of Compromise” to test

• Product Enablement for Detection – Ensure that attack surface logs

– Mark security messages as security

• Respond – Plan & practice before a real incident

Compliance-Driven Requirements

• Can be a useful source even if not required

– NIST Special Publication 200

– PCI-DSS

– Both relate closely to other requirements frameworks

• Cloud Security Alliance mappings

– Compare 10 frameworks (COBIT, HIPPA, ISO, PCI- DSS, etc)

Privacy Requirements

• Meeting customer, regulatory & business needs

• Fair Information Practices

– Notice, consent, redress and others

– Basis of many national laws

• Privacy by Design

– Proactive, by default, embedded, positive sum, lifecycle protection, transparency, respect for users

• Seven Laws of Identity

STRIDE

• The requirements are the inverse of the threats

• Thus spoofing impacts authentication requirements (etc.)

Spoofing — Authentication

• Is authentication required?

– Whitehouse.gov vs Wikipedia

• How strong an authentication is required?

• Account lifecycle

– Creation requirements

– Audit requirements

– Account closing

Tampering — Integrity

• Filesystem integrity

• Network integrity

• Log integrity

Repudiation — Non-Repudiation

• Logging

• Audit

• Fraud prevention

Info Disclosure — Confidentiality

• File confidentiality

• Metadata confidentiality

– Filename

– Directory name

– Fact of communication (“Calling an addiction support line”)

• Network confidentiality

Elevation — Authorization

• Manage authorization or delegate to platform?

• Central list of ACLs or rules stored with files?

– Central easier to manage programmatically

– Stored with files easier for people to understand

• Formal models (Bell-LaPadula, Biba)

Non-Requirements

• Important to decide, communicate what you don’t defend against

– Then customers can decide if it’s the right model

• Operational Guides

• Publish non-requirements documents

– “Microsoft Immutable Laws of Security”

Recap

• Threats and requirements have a natural interplay

• Lots of ways to find requirements

• Crisp requirements & non-requirements help you find the important threats

• Focus your security effort

ISOL 536 Security Architecture and Design

Threat Modeling Session 12a

Threat Modeling & Security Requirements

Agenda

• Interplay of threats and requirements • Requirements

– Business & Scenarios – Prevent/Detect/Respond – Compliance – Privacy – STRIDE

• Non-Requirements

• Reading: Chapter 12

Interplay of Attacks, Mitigations and Requirements

Requirements

Threats Mitigations

Requirements drive threats

Threats expose requirements

Un-mitigatable threats drive requirements

Threats need mitigation

Mitigations can be bypassed

1

2

3

4

5

6

Framing Requirements

• Important threats violate important requirements

• Crisp requirements help determine if something violates

– Thought-provoking: “A program that hasn’t been fully specified cannot be buggy, merely surprising.”

– Full specification is exceptionally rare

– Bugs are not rare

• Crisp requirements are hard

• Requirements often change as you learn more

• So getting “good enough” quickly is a useful goal

Cookbook Approach

• Chapter 12 is full of lists such as: – Anyone with an email address can create an account

– Anyone with a validated email address can create an account

– Anyone with a credit card number can create an account

– Anyone with a valid, authorizable credit card can create an account

– Anyone who can tell us how much we charged their credit card can …

• Intended to provoke consideration/conversation

• Many are incomplete, requiring scoping or customization

REQUIREMENTS

Business & Scenarios

• Scenario driven

– Use cases are a general approach to requirements

– Rare for security to show up in use cases, even as a feature

• Industry

– PCI-DSS, medical, other “verticals” impose requirements

• Competition

– One place it’s possible to get more crisp

Prevent/Detect/Respond (1/3)

• A common way of framing security problems

• Can lead to some interesting requirements for both development and operations

• Prevent

– Isolation (firewalls, air gaps)

– Least-privilege (sandboxing, running unprivileged)

– Vulnerability management

Prevent: Vulnerability Management (2/3)

• Vulnerabilities refer to code bugs which can be exploited leading to attacker code running

• Track vulnerabilities in code you depend on

– Operationally to patch

– Developmentally to integrate security fixes & ship updates

• Make it easy for others to report vulnerabilities to you

Detect/Respond (3/3)

• Operational Detection – Set goals for detection

– Use penetration testing, “Indicators of Compromise” to test

• Product Enablement for Detection – Ensure that attack surface logs

– Mark security messages as security

• Respond – Plan & practice before a real incident

Compliance-Driven Requirements

• Can be a useful source even if not required

– NIST Special Publication 200

– PCI-DSS

– Both relate closely to other requirements frameworks

• Cloud Security Alliance mappings

– Compare 10 frameworks (COBIT, HIPPA, ISO, PCI- DSS, etc)

Privacy Requirements

• Meeting customer, regulatory & business needs

• Fair Information Practices

– Notice, consent, redress and others

– Basis of many national laws

• Privacy by Design

– Proactive, by default, embedded, positive sum, lifecycle protection, transparency, respect for users

• Seven Laws of Identity

STRIDE

• The requirements are the inverse of the threats

• Thus spoofing impacts authentication requirements (etc.)

Spoofing — Authentication

• Is authentication required?

– Whitehouse.gov vs Wikipedia

• How strong an authentication is required?

• Account lifecycle

– Creation requirements

– Audit requirements

– Account closing

Tampering — Integrity

• Filesystem integrity

• Network integrity

• Log integrity

Repudiation — Non-Repudiation

• Logging

• Audit

• Fraud prevention

Info Disclosure — Confidentiality

• File confidentiality

• Metadata confidentiality

– Filename

– Directory name

– Fact of communication (“Calling an addiction support line”)

• Network confidentiality

Elevation — Authorization

• Manage authorization or delegate to platform?

• Central list of ACLs or rules stored with files?

– Central easier to manage programmatically

– Stored with files easier for people to understand

• Formal models (Bell-LaPadula, Biba)

Non-Requirements

• Important to decide, communicate what you don’t defend against

– Then customers can decide if it’s the right model

• Operational Guides

• Publish non-requirements documents

– “Microsoft Immutable Laws of Security”

Recap

• Threats and requirements have a natural interplay

• Lots of ways to find requirements

• Crisp requirements & non-requirements help you find the important threats

• Focus your security effort

Get help from top-rated tutors in any subject.

Efficiently complete your homework and academic assignments by getting help from the experts at homeworkarchive.com