Threat Modelling
Step 1 - Identifying Threats:- Focused on potential attackers
- Focused on safeguarding assets
- Focused on system or software vulnerabilities
- Utilising STRIDE framework: Spoofing, Tampering, Repudiation, Information Disclosure, Denial of Service (DoS), Elevation of Privilege
- Employing data flow diagrams, delineating privilege boundaries, and identifying involved elements
- Decomposing the application, system, or environment
- Considering trust boundaries, security stance and approach, data flow paths, privilege operations, and input points
- Assessing threats using the DREAD rating system
- Evaluating Damage potential, Reproducibility, Exploitability, Affected Users, and Discoverability
- Responding to threats in prioritized order
No comments:
Post a Comment