Use cases, new ideas, inspiring discussions, networking, and more 🤩
- 57 Topics
- 234 Replies
I came across an article that I can’t seem to find again. It asked if threat modeling should be a mandatory practice. We might all want to agree that it should (as we are a threat modeling community). However, I don’t believe the answer is binary. I think there is a spectrum that the answer lies on, and every organization has its point on that spectrum that they will be at that will evolve at some rate.I’d love to discuss everyone’s thoughts on this subject. Maybe a specific practice worked at one place but didn’t work at another. Also, something I think is interesting. Does trending threat modeling toward being mandatory help define a mature threat modeling process?
1)How to Integrate threat modelling into jira work flows?2)How/where to store the threat models so that can be easily be reviewed for future reference?In my experience diagrams/pdfs become obsolete and no one views them in the future?3)How to ensure all threats are covered ? How to know that we have threat modelled enough?4)How is threat modelling different from a secure design review ?
Hi everyone, I’m Izar Tarandach, a Sr Staff Engineer at Datadog these days helping develop security products. Previously, I helped Squarespace, Autodesk, DellEMC RSA, IBM, and Bridgewater Associates design and implement product- and enterprise-wide security solutions, offering guidance in the design and implementation of secure systems and products.I’m also a co-author of "Threat Modeling: A Practical Guide for Development Teams", O'Reilly with Matthew Coles, and part of the "Threat Modeling Manifesto" band. I wrote the Continuous Threat Modeling Handbook and lead the OWASP pytm project, the first (I think!) threat-model-with-code framework out there.Currently I am looking into the bridge between Observability and Security. I’m excited to talk about that, secure development and engineering, threat modeling, careers in cybersecurity, Threat Modeling Manifesto, my favorite movies, dogs, what is that funny fish and anything in between.How it works: Add your questions below any time before
Hello everyone!I am searching for ideas or experiment feedback on how to gather a sort of TM “NPS score” as a measure on how well or not we’re doing with our engineering teams. Hint: Sending MS Forms surveys don’t really work.Looking past the “number of threat models performed”, “number of security work items opened” (and maybe never worked on), etc… how would you measure the actual value that is brought (or not) to various engineering teams as you educate/have them perform threat modeling?As I am endeavoring in some development work to create a custom Azure DevOps extension for NFRs to bring stuff in-band of engineering teams (and ensure something more cyclic too), I have some rough ideas, but would like to open the question to the experts :)Thanks!
My organization is working to move our NIST maturity and one of the ways my team can help is in the area of Threat Modeling. There are some specific questions around TM but it seems that NIST looks at Networking, Database and Application Threat Modeling separately. To be honest, I didn’t know modeling was done in different pillars but holistically.Here are a few of the NIST questions. I would love feedback on how I can use a tool like IriusRisk to move the needle on these.Which of the following describe how network threat modeling is performed by the organization? TM performed against network attack surfaces Against data flow What is the estimated % of all databases for which the organization performs threat modeling to identify and prioritize potential threats? Which of the following describe the organization's implementation of threat modeling #3 is focused on application TM incorporated in SDLCBTW - NIST defines SDLC as System Development Lifecycle
https://freecontent.manning.com/better-software-development-with-collaborative-modeling/ - I’ve come across this book and the ideas look very applicable to what we do with threat modelling.Anyone familiar with these ideas? Have you tried it? Any other thoughts?
Question on reddit: Threat Modeling sometimes not the best option for adressing security? Request for comments
Sharing this from a post by u/RoAmbk on r/threatmodeling, I thought it would be good to get this community’s input.Hi,I sometimes need to help projects in the web/cloud domain, some of them are green field projects. Threat modeling is a vital part of the SSDLC of these projects. On the other hand, there are guidelines like OWASP Top 10, OWASP ASVS, and many more that can help getting to a certain security level.I prefer to first follow guidelines and only after these have been assessed, perform threat modeling to detect risks and mitigate them.I had the experience that putting threat modeling before assessing a guideline is not as effective for these kind of projects.On the other hand, threat modeling is best when assessing a very custom solution like an embedded system with networked and legacy components.Do you have some thoughts and comments? I would be very interested in your opinion.Thank you What do you think? (source: https://www.reddit.com/r/threatmodeling/comments/10xaxsm/thre
I routinely hear people struggle. Perhaps it's been too long since I first encountered it. Have you heard a good explanation of why it's hard? Do you have one of your own? What helped you overcome it? How do you teach it, or elicit boundaries when you’re leading threat modeling work?
Hi everyone,Are you utilizing the Versioning feature of IriusRisk? If yes, what are some of the main use cases that you are using it for?First thing that comes to my mind is when doing some major changes in the architecture of a product and you want to keep track of the changes. Thanks
This community seems like an appropriate place to share approaches to threat modelling, so I thought I’d share an open source tool called threatware that I created to help validate and manage threat models. I wrote a longer blog post discussing the origin of it, but this community might find some of the design decisions I made when I created the (suggested) process and tool - see An Opinionated Approach - as relevant discussion topics for challenges we all face when operating a threat modelling program of work.Hope you find it interesting, maybe even useful. Happy to discuss.
Hi, Threat Modeling Connect community!I’m Chris Romeo, CEO of Kerr Ventures and self-described “threat modeler to the stars.” I previously co-founded Security Journey and have participated in numerous initiatives, conferences, and community projects to drive application security and threat modeling in organizations of all sizes. I also host the award-winning “Application Security Podcast” with @RobertHurlbut (we’re both founding members of Threat Modeling Connect 😎).I’ve taught threat modeling and rolled it out across the Enterprise at Cisco. I’m excited to share my thoughts, approaches, and experiences with you through this AMA.Ask me anything about threat modeling!Here's how it works:Reply to this post with your question(s) any time before or during the AMA. Look at other community members’ questions and like those that you find interesting.On Friday, January 27th, 11:00-noon ET, I’ll be answering your questions live! Cheers,Chris
Hello community!As we’re planning for the content for Threat Modeling Connect for 2023, we’d like to know what interests you the most and the top challenges where you’d like more resources and support around.⬇️ Share your input by taking this poll:(Feel free to add a comment and share more context/details, e.g. peer support groups for XYZ topics , workshops for XYZ topics)
It seems to me that with the growing number of tools supporting threat modeling or working with TMs in an automated fashion (IR,shiftleft,OTM) a lot of possibilities open up for integrating these in CI/CD or other workflows.Are you aware of any implemented use cases in this direction? Are there any working examples for generating a TM (even for a small well understood domain) based on code or config changes for instance?
SBOMs are a critical part to helping secure the software supply chain. Having a catalogue of libraries and components in an SBOM is obviously the key element of this, so that it can be queried by security tools to identify known vulnerabilities. So far so good. I can’t help thinking that including a threat model in the SBOM would help to provide some additional context about the security decisions made by the vendor. What I mean is that as a software vendor, I choose my third party components and include them in my software. When I do that, I may make some security decisions such as including a library with a known vulnerability because I know that we don’t use that library in a way that exposes the vulnerability. A threat model would be a way for me to communicate this to readers of my SBOM.What do the SBOMmers think of this? Has any work been done in the area of marrying threat modeling and SBOMs?
How do you determine the “success” of a threat model program? Is there any Key Performance Indicators you’re using?It is not just the # of threat models created or # of threats reported, but the impact it makes. I’m curious how the community measures the impact of a threat model?
Since there are many different threat modeling methodologies (STRIDE, PASTA, DREAD, etc), I’d like to ask the community members:Which methodology is your favorite, and why? I’ve only used STRIDE and I’m eager to hear everyone’s thoughts on the others.
The 4-question philosophy is of course a useful and proven tool for guiding the threat model, but perhaps those 4 questions can too be useful for guiding a successful threat modeling program. Having spoken to so many different practitioners of threat modeling, it’s clear that there’s variances in schools of thought, processes that work for one organization versus another, motivations, and challenges that different teams/orgs encounter. I’d love to hear from the community your wisdom surrounding: What were you trying to build (who owned the activity, etc.)? What can go wrong (analysis paralysis, etc.)? What did you do about it? Finally…how did you evaluate if you did a good job? Threat modeling is all about collaboration, so I’m curious what the community can share based on their experience
There are a few maturity models out there that one could apply to threat modelling however none that fit the mold. i am in search for a maturity model/framework to leverage as a yard stick to measure progress in threat modelling practice and threat modelling program. I wanted to seek expertise, advice and guidance from the community as to what folks are using or have used as a maturity framework that seem to work.
I’m reposting my friend, François Proulx’s supply chain analysis because I believe it to provide an excellent example of a thorough threat model. Yes, indeed, do read the post if you need to understand software supply security. But this analysis also demonstrates a couple of critical threat modelling methods:Cataloging the relevant attacks (often called a “threat library”) Analyzing how the attacks work, who the victim is, what the likely impact will be if compromised Identifying appropriate counter-measures, which may include defences, mitigations, monitoring, etc. Explaining in some detail how the analysis worksA #threat model isn’t its methods. I often hear people confuse method with model. There isn’t any STRIDE analysis (though this model makes effective use of attack trees). There’s only a single visual representation that might be called a data flow diagram (DFD) - and that is very loose. it’s more of a process flow. Neither of these are required to build a model (though they mi
🔔 Stay connected
Start a conversation
Validate your ideas, share resources, get feedback from your peers and experts.Make a post
Create your account
Not a member yet? Become a member to join forum discussions, participate in community events and apply to write articles.Create an account
Log in with LinkedIn
Enter your username or e-mail address. We'll send you an e-mail with instructions to reset your password.