Validate ideas, share resources, and get feedback from your peers and experts
Questions on threat modelling
1)How to Integrate threat modelling into jira work flows?2)How/where to store the threat models so that can be easily be reviewed for future reference?In my experience diagrams/pdfs become obsolete and no one views them in the future?3)How to ensure all threats are covered ? How to know that we have threat modelled enough?4)How is threat modelling different from a secure design review ?
I'm Izar Tarandach - and if you have questions, I may have answers!Q&A
Hi everyone, I’m Izar Tarandach, a Sr Staff Engineer at Datadog these days helping develop security products. Previously, I helped Squarespace, Autodesk, DellEMC RSA, IBM, and Bridgewater Associates design and implement product- and enterprise-wide security solutions, offering guidance in the design and implementation of secure systems and products.I’m also a co-author of "Threat Modeling: A Practical Guide for Development Teams", O'Reilly with Matthew Coles, and part of the "Threat Modeling Manifesto" band. I wrote the Continuous Threat Modeling Handbook and lead the OWASP pytm project, the first (I think!) threat-model-with-code framework out there.Currently I am looking into the bridge between Observability and Security. I’m excited to talk about that, secure development and engineering, threat modeling, careers in cybersecurity, Threat Modeling Manifesto, my favorite movies, dogs, what is that funny fish and anything in between.How it works: Add your questions below any time before
Meet & Greet Your Peers 🤗
Hello, hola, hallo, guten tag, bonjour, shalom…community!One of the most exciting parts of your journey in Threat Modeling Connect is the opportunity to meet and work closely with the best and brightest (and kindest!) threat modeling professionals around the world. Let’s greet each other and share:Where you work, live, and your current role Your threat modeling experience, challenges, expertise - whether you’re just beginning or further down the journey, we’d love to hear more of your story Where we can find you if you’re not threat modelingWe’ll get to know each other more along the way. This is just the beginning of something great :)
NPS for threat modeling
Hello everyone!I am searching for ideas or experiment feedback on how to gather a sort of TM “NPS score” as a measure on how well or not we’re doing with our engineering teams. Hint: Sending MS Forms surveys don’t really work.Looking past the “number of threat models performed”, “number of security work items opened” (and maybe never worked on), etc… how would you measure the actual value that is brought (or not) to various engineering teams as you educate/have them perform threat modeling?As I am endeavoring in some development work to create a custom Azure DevOps extension for NFRs to bring stuff in-band of engineering teams (and ensure something more cyclic too), I have some rough ideas, but would like to open the question to the experts :)Thanks!
NIST Maturity mover using Threat Modeling
My organization is working to move our NIST maturity and one of the ways my team can help is in the area of Threat Modeling. There are some specific questions around TM but it seems that NIST looks at Networking, Database and Application Threat Modeling separately. To be honest, I didn’t know modeling was done in different pillars but holistically.Here are a few of the NIST questions. I would love feedback on how I can use a tool like IriusRisk to move the needle on these.Which of the following describe how network threat modeling is performed by the organization? TM performed against network attack surfaces Against data flow What is the estimated % of all databases for which the organization performs threat modeling to identify and prioritize potential threats? Which of the following describe the organization's implementation of threat modeling #3 is focused on application TM incorporated in SDLCBTW - NIST defines SDLC as System Development Lifecycle
Anyone tried to apply "Collaborative modeling" ideas in your threat modelling?
https://freecontent.manning.com/better-software-development-with-collaborative-modeling/ - I’ve come across this book and the ideas look very applicable to what we do with threat modelling.Anyone familiar with these ideas? Have you tried it? Any other thoughts?
Question on reddit: Threat Modeling sometimes not the best option for adressing security? Request for comments
Sharing this from a post by u/RoAmbk on r/threatmodeling, I thought it would be good to get this community’s input.Hi,I sometimes need to help projects in the web/cloud domain, some of them are green field projects. Threat modeling is a vital part of the SSDLC of these projects. On the other hand, there are guidelines like OWASP Top 10, OWASP ASVS, and many more that can help getting to a certain security level.I prefer to first follow guidelines and only after these have been assessed, perform threat modeling to detect risks and mitigate them.I had the experience that putting threat modeling before assessing a guideline is not as effective for these kind of projects.On the other hand, threat modeling is best when assessing a very custom solution like an embedded system with networked and legacy components.Do you have some thoughts and comments? I would be very interested in your opinion.Thank you What do you think? (source: https://www.reddit.com/r/threatmodeling/comments/10xaxsm/thre
Spring 2023 Hackathon in Full Swing!News
🎉 We just kicked off the Spring 2023 Hackathon this morning!Insecure design is now listed as number 4 in the OWASP Top 10 Web Application Security Risks. In recognition of International Women’s Day, our inaugural hackathon is designed to promote data privacy early in the software development lifecycle. With 70+ community members joining us live from all over the world at the Global Kick-Off, we had a incredible morning together and enjoyed: a delicious🍦 keynote speech by @Kim highlighting why the privacy posture of any software is more critical than ever and how “privacy by design” can be achieved through threat modeling a story from @purpleanchovy illustrating how a system’s intended functions can be misused and hurt people and how threat modeling could help address that a hands-on workshop led by @Chris Romeo that took us from performing threat modeling to a house, to an alarm system, and finally to a database great collaboration among the hackathon teams facilitated by ment
What makes trust boundaries a challenging concept?
I routinely hear people struggle. Perhaps it's been too long since I first encountered it. Have you heard a good explanation of why it's hard? Do you have one of your own? What helped you overcome it? How do you teach it, or elicit boundaries when you’re leading threat modeling work?
Versioning use cases
Hi everyone,Are you utilizing the Versioning feature of IriusRisk? If yes, what are some of the main use cases that you are using it for?First thing that comes to my mind is when doing some major changes in the architecture of a product and you want to keep track of the changes. Thanks
threat model tool - threatware
This community seems like an appropriate place to share approaches to threat modelling, so I thought I’d share an open source tool called threatware that I created to help validate and manage threat models. I wrote a longer blog post discussing the origin of it, but this community might find some of the design decisions I made when I created the (suggested) process and tool - see An Opinionated Approach - as relevant discussion topics for challenges we all face when operating a threat modelling program of work.Hope you find it interesting, maybe even useful. Happy to discuss.
Ask Me Anything about Threat Modeling on January 27th!Q&A
Hi, Threat Modeling Connect community!I’m Chris Romeo, CEO of Kerr Ventures and self-described “threat modeler to the stars.” I previously co-founded Security Journey and have participated in numerous initiatives, conferences, and community projects to drive application security and threat modeling in organizations of all sizes. I also host the award-winning “Application Security Podcast” with @RobertHurlbut (we’re both founding members of Threat Modeling Connect 😎).I’ve taught threat modeling and rolled it out across the Enterprise at Cisco. I’m excited to share my thoughts, approaches, and experiences with you through this AMA.Ask me anything about threat modeling!Here's how it works:Reply to this post with your question(s) any time before or during the AMA. Look at other community members’ questions and like those that you find interesting.On Friday, January 27th, 11:00-noon ET, I’ll be answering your questions live! Cheers,Chris
[POLL] What topics do you like to see more in 2023?
Hello community!As we’re planning for the content for Threat Modeling Connect for 2023, we’d like to know what interests you the most and the top challenges where you’d like more resources and support around.⬇️ Share your input by taking this poll:(Feel free to add a comment and share more context/details, e.g. peer support groups for XYZ topics , workshops for XYZ topics)
Has anyone experienced with integrating TM in automated pipelines?
It seems to me that with the growing number of tools supporting threat modeling or working with TMs in an automated fashion (IR,shiftleft,OTM) a lot of possibilities open up for integrating these in CI/CD or other workflows.Are you aware of any implemented use cases in this direction? Are there any working examples for generating a TM (even for a small well understood domain) based on code or config changes for instance?
Community News | January 2023News
Happy new year, community! 🎊As each of us strides our way into the new year, we’re here to support, help, and cheer for each other to improve our practices and build better threat modeling programs. Check out the January events and special projects below and join us to kick off the year with collaboration, sharing, and learning!By the way, we’re all about adding a little more fun to our days. Look out for an update to your community profile in mid January (hint: you will start earning points for your participation and unlocking new levels!⚡) 📅 EventsJan 20: January community meetup led by John Taylor (@jt.infosec) – Nothing compares to meeting like other practitioners yourself and bouncing ideas off each other. In this month’s meetup, John will take us through a series of discussion using @Adam Shostack’s famous “four questions” to analyze our program.[Limited seats available] 👉 Sign up now to secure your spot. Jan 16-27: Ask My Anything ft.@Chris Romeo – As one of the leading voic
Threat Models in SBOMs
SBOMs are a critical part to helping secure the software supply chain. Having a catalogue of libraries and components in an SBOM is obviously the key element of this, so that it can be queried by security tools to identify known vulnerabilities. So far so good. I can’t help thinking that including a threat model in the SBOM would help to provide some additional context about the security decisions made by the vendor. What I mean is that as a software vendor, I choose my third party components and include them in my software. When I do that, I may make some security decisions such as including a library with a known vulnerability because I know that we don’t use that library in a way that exposes the vulnerability. A threat model would be a way for me to communicate this to readers of my SBOM.What do the SBOMmers think of this? Has any work been done in the area of marrying threat modeling and SBOMs?
Threat modeling: mandatory or nah?
I came across an article that I can’t seem to find again. It asked if threat modeling should be a mandatory practice. We might all want to agree that it should (as we are a threat modeling community). However, I don’t believe the answer is binary. I think there is a spectrum that the answer lies on, and every organization has its point on that spectrum that they will be at that will evolve at some rate.I’d love to discuss everyone’s thoughts on this subject. Maybe a specific practice worked at one place but didn’t work at another. Also, something I think is interesting. Does trending threat modeling toward being mandatory help define a mature threat modeling process?
That's a wrap 🎉 our first community meetup!
Thank you all for joining our first meetup today. It was great to learn from everyone what threat modeling means to you and exchange key learning of starting a threat modeling program.🤗 Huge shoutout @Michael Bernhardt for facilitating this great discussion. Is there anything that’s been discussed that you’d like to learn more about? ⬇️ Share in the comments below and let’s keep the conversation going! 📅 Join our next monthly meetup!**Limited seats available. Secure your spot today!**
How do you define the success criteria for threat modeling?
How do you determine the “success” of a threat model program? Is there any Key Performance Indicators you’re using?It is not just the # of threat models created or # of threats reported, but the impact it makes. I’m curious how the community measures the impact of a threat model?
What's your favorite Threat Modeling methodology?
Since there are many different threat modeling methodologies (STRIDE, PASTA, DREAD, etc), I’d like to ask the community members:Which methodology is your favorite, and why? I’ve only used STRIDE and I’m eager to hear everyone’s thoughts on the others.
What can threat modeling teach us about threat modeling? 🤪
The 4-question philosophy is of course a useful and proven tool for guiding the threat model, but perhaps those 4 questions can too be useful for guiding a successful threat modeling program. Having spoken to so many different practitioners of threat modeling, it’s clear that there’s variances in schools of thought, processes that work for one organization versus another, motivations, and challenges that different teams/orgs encounter. I’d love to hear from the community your wisdom surrounding: What were you trying to build (who owned the activity, etc.)? What can go wrong (analysis paralysis, etc.)? What did you do about it? Finally…how did you evaluate if you did a good job? Threat modeling is all about collaboration, so I’m curious what the community can share based on their experience
🔔 Stay connected
Start a conversation
Join the community
Already have an account? Login
Create your account
Not a member yet? Become a member to join forum discussions, participate in community events and apply to write articles.Create an account
Log in with LinkedIn
Enter your username or e-mail address. We'll send you an e-mail with instructions to reset your password.