Threat Model
Risk Management in Secure Electronic Commerce
Four Phases of Risk Management
Assessment:
- Identify and evaluate assets, potential threats, and existing vulnerabilities.Planning:
- Define security policies and objectives.
- Determine what needs to be protected and why.Implementation:
- Select and deploy appropriate security technologies and mechanisms.
- Define how the policies will be enforced.Monitoring & Review:
- Continuously monitor the effectiveness of security measures.
- Identify successful strategies, detect failures, and adjust as needed to respond to evolving threats.
Measuring the Threat or Evaluating the Risk of Insecure Systems
Two primary approaches for assessing risks:
Analysis of Historical Risk:
- Review past incidents to understand attack types and impacts.
- Consider the financial and operational impact of previous breaches.Assessment of Potential Future Attacks:
- Evaluate emerging threats and trends in cybersecurity.
- Examine current security positions of existing systems to identify vulnerabilities.
Risk Management Model
Countermeasures Defined:
- Physical or logical procedures implemented to detect, reduce, or eliminate a threat.Key Strategy:
- Select countermeasures based on the likelihood and consequences of an event, leading to strategies such as:
- Prevention: Application security, access control, network-level protections (e.g., IPS, WAF).
- Mitigation: Control and containment measures.
- Transfer: Use of insurance or backup plans.
- Acceptance: Ignoring certain risks.
Common Mistakes in Security Risk Management
Underestimating the Value of Information:
- Inadequate protection due to failure to recognize the value of data and records.Defining Security Boundaries Too Narrowly:
- Ignoring broader systems like supply chains and third-party services.Reactive Security Management:
- Focusing responses only after the fact instead of proactive strategies.Outdated Practices:
- Reliance on obsolete tools does not address modern threats.Poor Communication of Responsibilities:
- Lack of clear roles leads to inconsistencies in applying security measures.
Recap: Risk Management
Definition and Objective:
- Systematic process of identifying, assessing, and prioritizing risks, aiming to reduce them to an acceptable level.Typical Process Involves:
1. Identifying potential risks.
2. Assessing risk likelihood and impact.
3. Prioritizing risks based on severity and likelihood.
4. Implementing risk controls: technical, procedural, or training.
5. Monitoring and reviewing ongoing effectiveness.
Threat Modeling Overview
Definition:
- Process assessing security risks from an adversary's perspective to identify potential threats and appropriate controls.Purpose and Goals:
- Understand threats early in analysis.
- Guide system design and security implementations.
Threat Modeling Process
A. Understand Adversary’s Perspective:
- Simulate attacks using techniques like penetration testing and red teaming.
B. Characterize System’s Security Position:
- Identify assets, entry points, trust boundaries, and data flows.
C. Evaluate Threats:
- Identify and categorize threats; use models like STRIDE for threat identification.
- Estimate risk likelihood and impact using frameworks like DREAD.
System Assets, Entry Points, and Trust Levels
Identifying System Assets:
- Valuable resources to protect include user credentials, personal information, network bandwidth, and organizational reputation.Discovering Entry Points:
- Locations where data or control exchanges occur; common vectors include network sockets, web forms, and APIs. - Potential Backdoor Entry Points:
- Vulnerable services, malware, or misconfigurations.
- Importance of examining neglected entry points.Trust Levels and Resource Access:
- Define privilege levels for users and systems, implementing access control and least privilege principles.Monitor activates from high-trust users. (Admin, DB admin, Web admins)
Coding to a Threat Model
Definition:
- Structured approach for identifying, analyzing, and countering security threats.Benefits:
1. Identify critical application areas.
2. Prioritize security efforts and ongoing code reviews.
3. Determine appropriate defense mechanisms.
Risk Calculation Models
RPD Model:
- Risk exposure = Probability x Damage.DREAD Framework:
- Use scoring to evaluate:
- Damage: Potential harm from exploitation.
- Reproducibility: Ease of reproducing the attack.
- Exploitability: Complexity for attack execution.
- Affected users: Number of users potentially impacted.
- Discoverability: Ease of discovering the vulnerability. - Example vulnerabilities and their DREAD scoring provide actionable insights for prioritizing threats.
Additional Methodologies and Tools
Common Attack Pattern Enumeration and Classification (CAPEC):
- A classification taxonomy aiding in identifying methodologies linked to vulnerabilities.Intel’s Threat Agent Risk Assessment (TARA):
- Focused on identifying attack vectors for secure development.
- Assessment steps include measuring current threats and assessing agent capabilities.Process for Attack Simulation and Threat Analysis (PASTA):
- A risk-centric, attacker-centric methodology for creating effective security countermeasures.
Conclusion
Achieving Security:
- Use of cryptography, secure networks, antivirus software, firewalls, and promoting safe computing practices to reduce risks in electronic commerce.