Threat Modelling
Step 1 - Identifying Threats:- Focused on potential attackers
 - Focused on safeguarding assets
 - Focused on system or software vulnerabilities
 
- Utilising STRIDE framework: Spoofing, Tampering, Repudiation, Information Disclosure, Denial of Service (DoS), Elevation of Privilege
 
- Employing data flow diagrams, delineating privilege boundaries, and identifying involved elements
 
- Decomposing the application, system, or environment
 - Considering trust boundaries, security stance and approach, data flow paths, privilege operations, and input points
 
- Assessing threats using the DREAD rating system
 - Evaluating Damage potential, Reproducibility, Exploitability, Affected Users, and Discoverability
 - Responding to threats in prioritized order
 
No comments:
Post a Comment