SlideShare a Scribd company logo
© 2018 Synopsys, Inc.1
Threat Modeling—Process Maturity
Taking It to the Next Level
Vinay Vishwanatha, Associate Managing Consultant
Meetup date
© 2018 Synopsys, Inc.2
Threat modeling
Threat modeling is a software design analysis that looks for security weaknesses
by juxtaposing software design views against a set of attackers.
It identifies:
- Secure design weaknesses
- Missing security controls
- Weak or inappropriate security controls
- Potential vulnerabilities
In the model we highlight:
- Assets
- Controls
- Threat agents
- Attack surface
© 2018 Synopsys, Inc.3
Threat modeling is a software design analysis that
looks for security
weaknesses by juxtaposing software design views
against a set of attackers.
It identifies:
• Secure design weaknesses
• Missing security controls
• Weak or inappropriate security controls
• Potential vulnerabilities
In the model we highlight:
• Assets
• Controls
• Threat agents
• Attack surface
Threat modeling
© 2018 Synopsys, Inc.4
Impediments to threat modeling
In practice, there are impediments that cause firms
to lose their grip on the threat modeling process.
What holds them back?
• Tool limitations
• Time (threat modeling can be time-consuming)
• Inability to scale
• Skills gap
Problem statement
© 2018 Synopsys, Inc.5
Impediments to threat modeling
In practice, there are impediments that cause firms
to lose their grip on the threat modeling process.
What holds them back?
• Tool limitations
• Time (threat modeling can be time-consuming)
• Inability to scale
• Skills gap
Problem statement
© 2018 Synopsys, Inc.6
1 2 3 4
Commitment
Impact
Scale
Exploration
Pilot
Baby steps
Denial
Not required
Resistance
Hard to adapt
Psychology of change
Change is the only constant
© 2018 Synopsys, Inc.7
Denial phase
Penetration testing and secure code review
uncover many types of security issues (bugs) in an
application; however, there are gaps (design flaws)
that simply cannot be found with these traditional
analysis techniques.
Bug is an implementation-level software problem
or defect in code.
Flaw is a design-level or architectural defect in
specifications or software that is more difficult
to resolve once the software is partially
or completely implemented.
We already conduct penetration tests and code reviews. We’re covered.
Architectural
Bugs
Implementation
Flaws
50%50%
Security defects
uncovered in practice
© 2018 Synopsys, Inc.8
Resistance phase
We’ve considered threat modeling and feel that it is way too complicated
Challenges
Doesn’t fit into Agile dev shops
Legacy apps
Lack of skilled resources
Budget issues
Solutions
Out-of-band activity during the design phase
Tactical threat modeling
Use vendors for pilot phase
Risk-based testing
At the root, everyone knows Couch Potatoes
have a deep-seated fear of exercise.
Next slide included with different cartoon option
Depending on copyright concerns in using this
image
© 2018 Synopsys, Inc.9
Resistance phase
We’ve considered threat modeling and feel that it is way too complicated
Challenges
Doesn’t fit into Agile dev shops
Legacy apps
Lack of skilled resources
Budget issues
Solutions
Out-of-band activity during the
design phase
Tactical threat modeling
Use vendors for pilot phase
Risk-based testing He tried to hold back the blades of change.
© 2018 Synopsys, Inc.10
Exploration phase
Challenges
• Scalability
• Guidance
• Supporting Infrastructure
• DevOps Culture
Solutions
• 80/20 rule, pattern-based
design reviews
• Requirement management
and blueprints
• Infrastructure risk
assessment
• Champion program and
developer enablement
Developing a canonical list of attacks at the design level is more than half the battle
© 2018 Synopsys, Inc.11
Challenges
• Scalability
• Guidance
• Supporting Infrastructure
• DevOps Culture
Exploration phase
Solutions
• 80/20 rule, pattern-based
design reviews
• Requirement management
and blueprints
• Infrastructure risk
assessment
• Champion program and
developer enablement
Developing a canonical list of attacks at the design level is more than half the battle
© 2018 Synopsys, Inc.13
Commitment phase
• Standardization:
think beyond canned attacks
• Training: have office hours for champions
• Metrics: track the identified flaws
• Next steps: use threat modeling findings
to drive pen tests/code reviews
Approach threat modeling as a living resource that evolves with the associated application
© 2018 Synopsys, Inc.14
Commitment phase
Standardization:
Think beyond canned attacks
Training:
have office hours for champions
Metrics:
track the identified flaws
Next steps:
use threat modeling findings to drive
pen tests/code reviews
Approach threat modeling as a living resource that evolves with the associated application
© 2018 Synopsys, Inc.15
Embrace threat
modeling to find
design flaws in
security defects
(50/50)
Pilot threat modeling
Coverage for
critical apps
Sprint—out-of-band
activity
Pattern-based
design reviews
Create requirement
management
and blueprints
Infrastructure risk
assessment
Developer
enablement
Think beyond
canned attacks
Train champions
frequently
Metrics
Feed threat modeling
findings to pen tests
Summary: Threat modeling process maturity
Good design adds value faster than it adds cost
Thank You
https://www.linkedin.com/in/vinayvishwanatha/
OWASP Chicago Meetup Presentation - Threat Modeling-Process Maturity

More Related Content

PPTX
6 Most Common Threat Modeling Misconceptions
PDF
The Path to Proactive Application Security
PDF
Get Your Board to Say "Yes" to a BSIMM Assessment
PDF
Are Agile And Secure Development Mutually Exclusive?
PPTX
Can You Really Automate Yourself Secure
PPTX
Perforce on Tour 2015 - Grab Testing By the Horns and Move
PDF
What is Software Testing?
PPTX
Appsec Agility: A Brief Tour
6 Most Common Threat Modeling Misconceptions
The Path to Proactive Application Security
Get Your Board to Say "Yes" to a BSIMM Assessment
Are Agile And Secure Development Mutually Exclusive?
Can You Really Automate Yourself Secure
Perforce on Tour 2015 - Grab Testing By the Horns and Move
What is Software Testing?
Appsec Agility: A Brief Tour

What's hot (20)

PPTX
5 Ways to Reduce 3rd Party Developer Risk
PDF
Getting Executive Support for a Software Security Program
PDF
A Warrior's Journey: Building a Global AppSec Program - OWASP Global AppSec 2020
PPTX
Shifting the conversation from active interception to proactive neutralization
PPTX
Security Champions - Introduce them in your Organisation
PPT
Software Security Frameworks
PPTX
Reduce Third Party Developer Risks
PPTX
Engineering Security Vulnerability Prevention, Detection, and Response
PPTX
Threat Modeling with Threat Dragon
PPTX
Cyber security - It starts with the embedded system
PDF
Secure Software Development Lifecycle - Devoxx MA 2018
PPTX
Agile and Secure Development
PDF
PDF
Most effective QA & testing types
PDF
Nesma autumn conference - Outsourcing needs software measurement - Werner Hei...
PPTX
Lean and (Prepared for) Mean: Application Security Program Essentials
PDF
Shift Left Security - The What, Why and How
PPTX
Agile security
PDF
Security Code Review Case Study - we45
PDF
AppSec How-To: Achieving Security in DevOps
5 Ways to Reduce 3rd Party Developer Risk
Getting Executive Support for a Software Security Program
A Warrior's Journey: Building a Global AppSec Program - OWASP Global AppSec 2020
Shifting the conversation from active interception to proactive neutralization
Security Champions - Introduce them in your Organisation
Software Security Frameworks
Reduce Third Party Developer Risks
Engineering Security Vulnerability Prevention, Detection, and Response
Threat Modeling with Threat Dragon
Cyber security - It starts with the embedded system
Secure Software Development Lifecycle - Devoxx MA 2018
Agile and Secure Development
Most effective QA & testing types
Nesma autumn conference - Outsourcing needs software measurement - Werner Hei...
Lean and (Prepared for) Mean: Application Security Program Essentials
Shift Left Security - The What, Why and How
Agile security
Security Code Review Case Study - we45
AppSec How-To: Achieving Security in DevOps
Ad

Similar to OWASP Chicago Meetup Presentation - Threat Modeling-Process Maturity (20)

PDF
Designing NextGen Threat Identification Solutions
PDF
Application Security Testing for a DevOps Mindset
PPTX
Security Culture from Concept to Maintenance: Secure Software Development Lif...
PDF
Synopsys Security Event Israel Presentation: Keynote: Securing Your Software,...
PDF
Bridging the Security Testing Gap in Your CI/CD Pipeline
PPTX
How to Build Security and Risk Management into Agile Environments
PPTX
Digital Product Security
PDF
Applicaiton Security - Building The Audit Program
PPTX
Create Agile confidence for better application security
PDF
Webinar–Creating a Modern AppSec Toolchain to Quantify Service Risks
PPTX
Application Security - Dont leave your AppSec for the last moment Meetup 2104...
PDF
Running a Software Security Program with Open Source Tools
PDF
CISSP Domain 08 Software Development Security.pdf
PPTX
Application Threat Modeling
PPSX
Manoj Purandare - Application Security - Secure Code Assessment Program - Pre...
PPTX
Manoj Purandare - Application Security - Secure Code Assessment Program - Pre...
PPTX
Manoj Purandare - Application Security - Secure Code Assessment Program - Pre...
PPTX
Threat modelling(system + enterprise)
PDF
Giving your AppSec program the edge - using OpenSAMM for benchmarking and sof...
PPTX
Application Hackers Have A Handbook. Why Shouldn't You?
Designing NextGen Threat Identification Solutions
Application Security Testing for a DevOps Mindset
Security Culture from Concept to Maintenance: Secure Software Development Lif...
Synopsys Security Event Israel Presentation: Keynote: Securing Your Software,...
Bridging the Security Testing Gap in Your CI/CD Pipeline
How to Build Security and Risk Management into Agile Environments
Digital Product Security
Applicaiton Security - Building The Audit Program
Create Agile confidence for better application security
Webinar–Creating a Modern AppSec Toolchain to Quantify Service Risks
Application Security - Dont leave your AppSec for the last moment Meetup 2104...
Running a Software Security Program with Open Source Tools
CISSP Domain 08 Software Development Security.pdf
Application Threat Modeling
Manoj Purandare - Application Security - Secure Code Assessment Program - Pre...
Manoj Purandare - Application Security - Secure Code Assessment Program - Pre...
Manoj Purandare - Application Security - Secure Code Assessment Program - Pre...
Threat modelling(system + enterprise)
Giving your AppSec program the edge - using OpenSAMM for benchmarking and sof...
Application Hackers Have A Handbook. Why Shouldn't You?
Ad

More from Synopsys Software Integrity Group (20)

PDF
Webinar–Segen oder Fluch?
PDF
Webinar–Mobile Application Hardening Protecting Business Critical Apps
PDF
Webinar–The 2019 Open Source Year in Review
PDF
Webinar–Best Practices for DevSecOps at Scale
PDF
Webinar–That is Not How This Works
PDF
Webinar–You've Got Your Open Source Audit Report–Now What?
PDF
Webinar–OWASP Top 10 for JavaScript for Developers
PDF
Webinar–The State of Open Source in M&A Transactions
PDF
Webinar–5 ways to risk rank your vulnerabilities
PDF
Do Design Quality and Code Quality Matter in Merger and Acquisition Tech Due ...
PDF
Webinar–Using Evidence-Based Security
PDF
Webinar–Delivering a Next Generation Vulnerability Feed
PDF
Webinar–Financial Services Study Shows Why Investing in AppSec Matters
PDF
Webinar–What You Need To Know About Open Source Licensing
PDF
Webinar–Improving Fuzz Testing of Infotainment Systems and Telematics Units U...
PDF
Webinar–Why All Open Source Scans Aren't Created Equal
PDF
Webinar–Is Your Software Security Supply Chain a Security Blind Spot?
PDF
Webinar–Sécurité Applicative et DevSecOps dans un monde Agile
PDF
Webinar – Streamling Your Tech Due Diligence Process for Software Assets
PDF
Webinar – Security Tool Misconfiguration and Abuse
Webinar–Segen oder Fluch?
Webinar–Mobile Application Hardening Protecting Business Critical Apps
Webinar–The 2019 Open Source Year in Review
Webinar–Best Practices for DevSecOps at Scale
Webinar–That is Not How This Works
Webinar–You've Got Your Open Source Audit Report–Now What?
Webinar–OWASP Top 10 for JavaScript for Developers
Webinar–The State of Open Source in M&A Transactions
Webinar–5 ways to risk rank your vulnerabilities
Do Design Quality and Code Quality Matter in Merger and Acquisition Tech Due ...
Webinar–Using Evidence-Based Security
Webinar–Delivering a Next Generation Vulnerability Feed
Webinar–Financial Services Study Shows Why Investing in AppSec Matters
Webinar–What You Need To Know About Open Source Licensing
Webinar–Improving Fuzz Testing of Infotainment Systems and Telematics Units U...
Webinar–Why All Open Source Scans Aren't Created Equal
Webinar–Is Your Software Security Supply Chain a Security Blind Spot?
Webinar–Sécurité Applicative et DevSecOps dans un monde Agile
Webinar – Streamling Your Tech Due Diligence Process for Software Assets
Webinar – Security Tool Misconfiguration and Abuse

Recently uploaded (20)

PDF
EN-Survey-Report-SAP-LeanIX-EA-Insights-2025.pdf
PDF
Digital Strategies for Manufacturing Companies
PDF
Adobe Illustrator 28.6 Crack My Vision of Vector Design
PDF
T3DD25 TYPO3 Content Blocks - Deep Dive by André Kraus
PPTX
L1 - Introduction to python Backend.pptx
PDF
How to Choose the Right IT Partner for Your Business in Malaysia
PDF
Adobe Premiere Pro 2025 (v24.5.0.057) Crack free
PDF
Flood Susceptibility Mapping Using Image-Based 2D-CNN Deep Learnin. Overview ...
PPTX
Operating system designcfffgfgggggggvggggggggg
PDF
PTS Company Brochure 2025 (1).pdf.......
PPTX
Essential Infomation Tech presentation.pptx
PPTX
VVF-Customer-Presentation2025-Ver1.9.pptx
PPTX
ai tools demonstartion for schools and inter college
PDF
Upgrade and Innovation Strategies for SAP ERP Customers
PDF
Which alternative to Crystal Reports is best for small or large businesses.pdf
PPTX
Agentic AI Use Case- Contract Lifecycle Management (CLM).pptx
PPTX
Odoo POS Development Services by CandidRoot Solutions
PDF
medical staffing services at VALiNTRY
PDF
System and Network Administration Chapter 2
PDF
Audit Checklist Design Aligning with ISO, IATF, and Industry Standards — Omne...
EN-Survey-Report-SAP-LeanIX-EA-Insights-2025.pdf
Digital Strategies for Manufacturing Companies
Adobe Illustrator 28.6 Crack My Vision of Vector Design
T3DD25 TYPO3 Content Blocks - Deep Dive by André Kraus
L1 - Introduction to python Backend.pptx
How to Choose the Right IT Partner for Your Business in Malaysia
Adobe Premiere Pro 2025 (v24.5.0.057) Crack free
Flood Susceptibility Mapping Using Image-Based 2D-CNN Deep Learnin. Overview ...
Operating system designcfffgfgggggggvggggggggg
PTS Company Brochure 2025 (1).pdf.......
Essential Infomation Tech presentation.pptx
VVF-Customer-Presentation2025-Ver1.9.pptx
ai tools demonstartion for schools and inter college
Upgrade and Innovation Strategies for SAP ERP Customers
Which alternative to Crystal Reports is best for small or large businesses.pdf
Agentic AI Use Case- Contract Lifecycle Management (CLM).pptx
Odoo POS Development Services by CandidRoot Solutions
medical staffing services at VALiNTRY
System and Network Administration Chapter 2
Audit Checklist Design Aligning with ISO, IATF, and Industry Standards — Omne...

OWASP Chicago Meetup Presentation - Threat Modeling-Process Maturity

  • 1. © 2018 Synopsys, Inc.1 Threat Modeling—Process Maturity Taking It to the Next Level Vinay Vishwanatha, Associate Managing Consultant Meetup date
  • 2. © 2018 Synopsys, Inc.2 Threat modeling Threat modeling is a software design analysis that looks for security weaknesses by juxtaposing software design views against a set of attackers. It identifies: - Secure design weaknesses - Missing security controls - Weak or inappropriate security controls - Potential vulnerabilities In the model we highlight: - Assets - Controls - Threat agents - Attack surface
  • 3. © 2018 Synopsys, Inc.3 Threat modeling is a software design analysis that looks for security weaknesses by juxtaposing software design views against a set of attackers. It identifies: • Secure design weaknesses • Missing security controls • Weak or inappropriate security controls • Potential vulnerabilities In the model we highlight: • Assets • Controls • Threat agents • Attack surface Threat modeling
  • 4. © 2018 Synopsys, Inc.4 Impediments to threat modeling In practice, there are impediments that cause firms to lose their grip on the threat modeling process. What holds them back? • Tool limitations • Time (threat modeling can be time-consuming) • Inability to scale • Skills gap Problem statement
  • 5. © 2018 Synopsys, Inc.5 Impediments to threat modeling In practice, there are impediments that cause firms to lose their grip on the threat modeling process. What holds them back? • Tool limitations • Time (threat modeling can be time-consuming) • Inability to scale • Skills gap Problem statement
  • 6. © 2018 Synopsys, Inc.6 1 2 3 4 Commitment Impact Scale Exploration Pilot Baby steps Denial Not required Resistance Hard to adapt Psychology of change Change is the only constant
  • 7. © 2018 Synopsys, Inc.7 Denial phase Penetration testing and secure code review uncover many types of security issues (bugs) in an application; however, there are gaps (design flaws) that simply cannot be found with these traditional analysis techniques. Bug is an implementation-level software problem or defect in code. Flaw is a design-level or architectural defect in specifications or software that is more difficult to resolve once the software is partially or completely implemented. We already conduct penetration tests and code reviews. We’re covered. Architectural Bugs Implementation Flaws 50%50% Security defects uncovered in practice
  • 8. © 2018 Synopsys, Inc.8 Resistance phase We’ve considered threat modeling and feel that it is way too complicated Challenges Doesn’t fit into Agile dev shops Legacy apps Lack of skilled resources Budget issues Solutions Out-of-band activity during the design phase Tactical threat modeling Use vendors for pilot phase Risk-based testing At the root, everyone knows Couch Potatoes have a deep-seated fear of exercise. Next slide included with different cartoon option Depending on copyright concerns in using this image
  • 9. © 2018 Synopsys, Inc.9 Resistance phase We’ve considered threat modeling and feel that it is way too complicated Challenges Doesn’t fit into Agile dev shops Legacy apps Lack of skilled resources Budget issues Solutions Out-of-band activity during the design phase Tactical threat modeling Use vendors for pilot phase Risk-based testing He tried to hold back the blades of change.
  • 10. © 2018 Synopsys, Inc.10 Exploration phase Challenges • Scalability • Guidance • Supporting Infrastructure • DevOps Culture Solutions • 80/20 rule, pattern-based design reviews • Requirement management and blueprints • Infrastructure risk assessment • Champion program and developer enablement Developing a canonical list of attacks at the design level is more than half the battle
  • 11. © 2018 Synopsys, Inc.11 Challenges • Scalability • Guidance • Supporting Infrastructure • DevOps Culture Exploration phase Solutions • 80/20 rule, pattern-based design reviews • Requirement management and blueprints • Infrastructure risk assessment • Champion program and developer enablement Developing a canonical list of attacks at the design level is more than half the battle
  • 12. © 2018 Synopsys, Inc.13 Commitment phase • Standardization: think beyond canned attacks • Training: have office hours for champions • Metrics: track the identified flaws • Next steps: use threat modeling findings to drive pen tests/code reviews Approach threat modeling as a living resource that evolves with the associated application
  • 13. © 2018 Synopsys, Inc.14 Commitment phase Standardization: Think beyond canned attacks Training: have office hours for champions Metrics: track the identified flaws Next steps: use threat modeling findings to drive pen tests/code reviews Approach threat modeling as a living resource that evolves with the associated application
  • 14. © 2018 Synopsys, Inc.15 Embrace threat modeling to find design flaws in security defects (50/50) Pilot threat modeling Coverage for critical apps Sprint—out-of-band activity Pattern-based design reviews Create requirement management and blueprints Infrastructure risk assessment Developer enablement Think beyond canned attacks Train champions frequently Metrics Feed threat modeling findings to pen tests Summary: Threat modeling process maturity Good design adds value faster than it adds cost