Member-only story
Threat Modeling — The Short Version
Threat Modeling is the structured practice of identifying and prioritizing potential threats and vulnerabilities, and the prioritization of mitigations to protect assets, including confidential data and intellectual property.
Threat Modeling Best Practices
- Define the scope and depth of analysis
- Understand what you’re threat modeling — Create a diagram or flowchart of the major components and how all the systems are connected.
- Model the attack possibilities — Identify assets, security controls, and threat agents to create a security model of the system.
- Identify threats — Identify potential attacks.
- Evaluate missing or weak security controls
Methodologies
STRIDE
Spoofing, Tampering, Repudiation, Information Disclosure, Denial of Service (DoS), and Elevation of Privilege (STRIDE) was developed by Microsoft with the goal to aid applications in meeting security standards based on the CIA triad principles: Confidentiality, Integrity, and Availability. STRIDE offers a six-category process to identify security threats, shown below.