ict 1 threat modelling a short introduction and stories from end user involvement srm seminar...

30
1 ICT Threat modelling A short introduction and stories from end user involvement SRM Seminar Luxembourg 22.06.2010 Per Håkon Meland - SINTEF ICT, Trondheim, Norway http://www.sintef.com/

Post on 19-Dec-2015

221 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: ICT 1 Threat modelling A short introduction and stories from end user involvement SRM Seminar Luxembourg 22.06.2010 Per Håkon Meland - SINTEF ICT, Trondheim,

1ICT

Threat modellingA short introduction and stories from end user

involvement

SRM Seminar Luxembourg 22.06.2010

Per Håkon Meland - SINTEF ICT, Trondheim, Norwayhttp://www.sintef.com/

Page 2: ICT 1 Threat modelling A short introduction and stories from end user involvement SRM Seminar Luxembourg 22.06.2010 Per Håkon Meland - SINTEF ICT, Trondheim,

2ICT

Motivation and background

Page 3: ICT 1 Threat modelling A short introduction and stories from end user involvement SRM Seminar Luxembourg 22.06.2010 Per Håkon Meland - SINTEF ICT, Trondheim,

3ICT

Hospital systems (2005 ) Integration and access control of

EPRs Models used to communicate

processes and threats

Page 4: ICT 1 Threat modelling A short introduction and stories from end user involvement SRM Seminar Luxembourg 22.06.2010 Per Håkon Meland - SINTEF ICT, Trondheim,

5ICT

SHIELDSDevelopers, security expertsand thewider community

SHIELDS SVRS and community site

Community site

Web interface

SVRS

Web interfaceMachine interface

User credentials Repository storage

Web

-Bro

wse

r

Develop

ment

and

mod

ellingtools

EU project 2008-2010 8 partners

Sharing of security knowledge Models Methods Tools and tool input

End user evaluations Sevaral iterations Real end-users Case studies and commercial

products

Page 5: ICT 1 Threat modelling A short introduction and stories from end user involvement SRM Seminar Luxembourg 22.06.2010 Per Håkon Meland - SINTEF ICT, Trondheim,

7ICT

Threat modelling

Page 6: ICT 1 Threat modelling A short introduction and stories from end user involvement SRM Seminar Luxembourg 22.06.2010 Per Håkon Meland - SINTEF ICT, Trondheim,

9ICT

Threat modelling Misuse cases and attack

trees Understand potential security

threats and vulnerabilities Understand attackers Find security design issues

before code Determine countermeasures Guide the code review

/testing/configuration /deployment

Highly reusable

Easy to grasp

Page 7: ICT 1 Threat modelling A short introduction and stories from end user involvement SRM Seminar Luxembourg 22.06.2010 Per Håkon Meland - SINTEF ICT, Trondheim,

10ICT

Example: Media player

Page 8: ICT 1 Threat modelling A short introduction and stories from end user involvement SRM Seminar Luxembourg 22.06.2010 Per Håkon Meland - SINTEF ICT, Trondheim,

11ICT

Xin

e m

edia

pla

yer

Page 9: ICT 1 Threat modelling A short introduction and stories from end user involvement SRM Seminar Luxembourg 22.06.2010 Per Håkon Meland - SINTEF ICT, Trondheim,

12ICT

Let’s create a model from scratch…

Page 10: ICT 1 Threat modelling A short introduction and stories from end user involvement SRM Seminar Luxembourg 22.06.2010 Per Håkon Meland - SINTEF ICT, Trondheim,

13ICT

Main functionality: Download data (application, codecs,

skins, ...) Play local media file Play media stream

Actors: Software developer User

Page 11: ICT 1 Threat modelling A short introduction and stories from end user involvement SRM Seminar Luxembourg 22.06.2010 Per Håkon Meland - SINTEF ICT, Trondheim,

14ICT

Page 12: ICT 1 Threat modelling A short introduction and stories from end user involvement SRM Seminar Luxembourg 22.06.2010 Per Håkon Meland - SINTEF ICT, Trondheim,

15ICT

Page 13: ICT 1 Threat modelling A short introduction and stories from end user involvement SRM Seminar Luxembourg 22.06.2010 Per Håkon Meland - SINTEF ICT, Trondheim,

16ICT

How about reusing one?

Page 14: ICT 1 Threat modelling A short introduction and stories from end user involvement SRM Seminar Luxembourg 22.06.2010 Per Håkon Meland - SINTEF ICT, Trondheim,

17ICT

Search for existing misuse case diagrams: “Media”, “player”, “Movie”

Page 15: ICT 1 Threat modelling A short introduction and stories from end user involvement SRM Seminar Luxembourg 22.06.2010 Per Håkon Meland - SINTEF ICT, Trondheim,

18ICT

Page 16: ICT 1 Threat modelling A short introduction and stories from end user involvement SRM Seminar Luxembourg 22.06.2010 Per Håkon Meland - SINTEF ICT, Trondheim,

19ICT

Attack trees

Page 17: ICT 1 Threat modelling A short introduction and stories from end user involvement SRM Seminar Luxembourg 22.06.2010 Per Håkon Meland - SINTEF ICT, Trondheim,

20ICT

Hide the details Link to attack

patterns Used to identify

mitigations

Page 18: ICT 1 Threat modelling A short introduction and stories from end user involvement SRM Seminar Luxembourg 22.06.2010 Per Håkon Meland - SINTEF ICT, Trondheim,

21ICT

Finally…

Page 19: ICT 1 Threat modelling A short introduction and stories from end user involvement SRM Seminar Luxembourg 22.06.2010 Per Håkon Meland - SINTEF ICT, Trondheim,

22ICT

Create textual description to accompany the diagram

A document elaborating the diagram

Threat descriptions can be fetched from the SHIELDS SVRS

Gives an understanding of the possible attacker motivation

There can be several different mitigations

Input to risk analysis and security activity planning

Page 20: ICT 1 Threat modelling A short introduction and stories from end user involvement SRM Seminar Luxembourg 22.06.2010 Per Håkon Meland - SINTEF ICT, Trondheim,

26ICT

Case study: eTourism

Page 21: ICT 1 Threat modelling A short introduction and stories from end user involvement SRM Seminar Luxembourg 22.06.2010 Per Håkon Meland - SINTEF ICT, Trondheim,

27ICT

Approach

1:Applicationdescription

2:Threat model created

by experts

3:Threatmodel createdby developers

4:Model consolidatedby experts

5:Threat model updatedby developers

6:Threat model endorsed

by experts

Phase 2: Parallel modelling Phase 3: Serial modelling

Phase 1: Tutorial

Page 22: ICT 1 Threat modelling A short introduction and stories from end user involvement SRM Seminar Luxembourg 22.06.2010 Per Håkon Meland - SINTEF ICT, Trondheim,

28ICT

Pre-visit, plan: Hotels Route Experiences Virtually explore

Post-visit, share Pictures/videos Route Recommendations Blog

Bad stuff?

Page 23: ICT 1 Threat modelling A short introduction and stories from end user involvement SRM Seminar Luxembourg 22.06.2010 Per Håkon Meland - SINTEF ICT, Trondheim,

29ICT

Case study: WaLDo

Page 24: ICT 1 Threat modelling A short introduction and stories from end user involvement SRM Seminar Luxembourg 22.06.2010 Per Håkon Meland - SINTEF ICT, Trondheim,

30ICT

Warehouse information system Dock loading RFID tracking Picking lists Advanced shipping notifications

Bad stuff?

Page 25: ICT 1 Threat modelling A short introduction and stories from end user involvement SRM Seminar Luxembourg 22.06.2010 Per Håkon Meland - SINTEF ICT, Trondheim,

31ICT

Page 26: ICT 1 Threat modelling A short introduction and stories from end user involvement SRM Seminar Luxembourg 22.06.2010 Per Håkon Meland - SINTEF ICT, Trondheim,

32ICT

Case study: eNewsPaper

Page 27: ICT 1 Threat modelling A short introduction and stories from end user involvement SRM Seminar Luxembourg 22.06.2010 Per Håkon Meland - SINTEF ICT, Trondheim,

33ICT

Electronic newspaper Aimed for the Paris metro Shared from distribution points User relays

Bad stuff?

User SystemDistribution Point

User SystemUser System

Page 28: ICT 1 Threat modelling A short introduction and stories from end user involvement SRM Seminar Luxembourg 22.06.2010 Per Håkon Meland - SINTEF ICT, Trondheim,

34ICT

Page 29: ICT 1 Threat modelling A short introduction and stories from end user involvement SRM Seminar Luxembourg 22.06.2010 Per Håkon Meland - SINTEF ICT, Trondheim,

35ICT

Feedback and lessons learned

New threats and mitigations were identified in all case studies

Misuse cases and attack trees: Easy to learn, easy to use

Important with diversity while doing threat modelling

Keep the size of the models down

Need more models from other application areas

Page 30: ICT 1 Threat modelling A short introduction and stories from end user involvement SRM Seminar Luxembourg 22.06.2010 Per Håkon Meland - SINTEF ICT, Trondheim,

36ICT

Share models through the SVRS!

Now contains >200 free security models

18 misuse case models

29 attack trees

Use the free tools, or integrate your own

Add your own, get feedback (and possibly revenue)

http://www.shields-project.eu