SlideShare a Scribd company logo
Injecting Threat Modeling
into the SDLC
Susan Bradley
QA or the Highway
February 27, 2018
About Me
• Mom
• Young Adult Mystery Writer
• Certified in Risk & Information Security Controls (CRISC)
• Certified Software Test Engineer (CSTE)
• Certified Six Sigma Black Belt (CSSBB)
• Certified Associate Business Continuity Professional (ABCP)
• Quality Assurance 20+ Years
• Lean Management 5 Years
Use Case- What Went Wrong?
Let’s Break it Down
• Equifax Data Breach: Patch wasn’t applied, was it identified as a risk, did risk
have an owner? Is there a process for applying patches? Millions of people
impacted.
• NASA Mars Orbiter Lost: Was the process reviewed from start to finish? When
looking at the process, did someone ask, “Hey, are we using the metric or
English system?”. Costly, and could have been be deadly.
• High Sierra: Enter User Name: Root, No password necessary. Security flaws
don’t instill customer confidence
• Hawaii Emergency Alert: Live vs. Test Alert was sent. Incited panic. “Wow, the
live alert looks too similar to the test alert-maybe we should change that?”
What is Threat Modeling?
A structured approach that enables you to
identify, quantify, and address the security risks
associated with an application.
When to Use Threat Modeling
 New:
 Functionality
 Application
 Process
 Vendor Connection or
Existing Functionality
 Existing:
 Functionality
 Application
 Process
 Vendor Connection or
Existing Functionality
You’ve already done Threat Modeling
“When we think ahead of what could go wrong, weigh the risks, and act accordingly, we are "threat modeling"
The Software Development Lifecycle-
Waterfall
The Software Development Lifecycle-
Agile
Why Inject Threat Modeling?
 Mitigate what keeps you up at night
 How are we going to handle …?
 Find risks before your customer or a hacker
does?
 Build in quality
 Build company’s reputation
 Protect your customer’s data
Threat Modeling Process
 Data Flow Diagram
 Understand the system
 Identify Threats
 Proposed Response: Accept, Avoid, Mitigate,
Transfer
 Prioritize Mitigation
Typical Threat Modeling Session:
 Gather documentation
 Gather your team-it's not a solo endeavor
 Understand your business & technical goals
 Agree on meeting date(s) and time(s)
 Plan on 1-2 hour focused sessions at a time
 Be honest about what is there-it's all about discovery,
no blaming or egos
 *It's a living process to be revisited when major changes occur
Threat Modeling: Requirements Phase
What are the log-in authentications?
Do we have standards?
How will we handle errors?
How will we handle data?
Who would want to do us harm?
Threat Modeling: Design
Goal: Decompose the Application.
 Look at process end-to-end
 Where are the threats?
 Are we adding vulnerabilities by integrating with
system X?
 What are my interactions with external entities?
Threat Modeling: Development
Goal: Build in Prevention
 What are the threats?
 How can an attacker bypass?
 What can go wrong with database files?
 Use STRIDE Method
STRIDE Spoofing-Assume identity of client, server, or
request
Tampering-Alter Contents of request of response
Repudiation-Insufficient auditing or record
keeping
Information Disclosure-Unauthorized release of
data
Denial of Service-Service not available to
authorized users
Elevation of Privilege-Bypass authorization
system
What to do with the Identified?
 Determine the potential impact
 How likely is it to occur?
 What is the risk = likelihood x impact
 How do we want to handle the risk?
 What is the priority?
Ready to Inject Threat Modeling?
Requirements
Threat
Model
Design
Threat
Model
Develop
Threat
Model
Contact Info
 https://www.linkedin.com/in/susan-bradley-cste/

More Related Content

PPTX
There's no time to test, can you just automate it? by Anna Heiermann
PPTX
Is Test Planning a lost art in Agile? by Michelle Williams
PPTX
Test Strategy-The real silver bullet in testing by Matthew Eakin
PDF
Behavior Driven Development—A Guide to Agile Practices by Josh Eastman
PDF
Hey You Got Your TDD in my SQL DB by Jeff McKenzie
PPTX
From Gatekeeper to Partner by Kelsey Shannahan
PPTX
Using JIRA for Risk Based Testing - QASymphony Webinar
PPTX
Risk Mitigation Using Exploratory and Technical Testing | QASymphony Webinar
There's no time to test, can you just automate it? by Anna Heiermann
Is Test Planning a lost art in Agile? by Michelle Williams
Test Strategy-The real silver bullet in testing by Matthew Eakin
Behavior Driven Development—A Guide to Agile Practices by Josh Eastman
Hey You Got Your TDD in my SQL DB by Jeff McKenzie
From Gatekeeper to Partner by Kelsey Shannahan
Using JIRA for Risk Based Testing - QASymphony Webinar
Risk Mitigation Using Exploratory and Technical Testing | QASymphony Webinar

What's hot (20)

PDF
[HCMC STC Jan 2015] Proving Our Worth Quantifying The Value Of Testing
PPTX
Test Estimation Hacks: Tips, Tricks and Tools Webinar
PDF
[HCMC STC Jan 2015] Workshop Of Context-Driven Testing In Agile
PPTX
10 signs your testing is not enough
PDF
Mindful Metrics (QAotHW 2018)
PPTX
Evolve or Die: Healthcare IT Testing | QASymphony Webinar
PDF
A Rapid Introduction to Rapid Software Testing
PPTX
Closing the Requirements and Testing Loop Webinar
PPTX
Agile Testing Analytics
PDF
A Taste of Exploratory Testing
PDF
Ken Johnston - Big Bugs That Got Away - EuroSTAR 2010
PDF
Rapid Software Testing
PPTX
Exploratory Testing with JIRA | QASymphony Webinar
PDF
Chicago Code Camp 2014 - Agile Testing in a waterfall world
PDF
Rapid software testing
PPTX
Digital Transformation, Testing and Automation
PDF
Risk based testing with Jira and Jubula
PPTX
Agile Testing
PDF
Effective Testing Practices in an Agile Environment
KEY
Testing and DevOps Culture: Lessons Learned
[HCMC STC Jan 2015] Proving Our Worth Quantifying The Value Of Testing
Test Estimation Hacks: Tips, Tricks and Tools Webinar
[HCMC STC Jan 2015] Workshop Of Context-Driven Testing In Agile
10 signs your testing is not enough
Mindful Metrics (QAotHW 2018)
Evolve or Die: Healthcare IT Testing | QASymphony Webinar
A Rapid Introduction to Rapid Software Testing
Closing the Requirements and Testing Loop Webinar
Agile Testing Analytics
A Taste of Exploratory Testing
Ken Johnston - Big Bugs That Got Away - EuroSTAR 2010
Rapid Software Testing
Exploratory Testing with JIRA | QASymphony Webinar
Chicago Code Camp 2014 - Agile Testing in a waterfall world
Rapid software testing
Digital Transformation, Testing and Automation
Risk based testing with Jira and Jubula
Agile Testing
Effective Testing Practices in an Agile Environment
Testing and DevOps Culture: Lessons Learned
Ad

Similar to Injecting Threat Modeling into the SDLC by Susan Bradley (20)

PDF
(ISC)2 Security Congress 2015 - The Cloud Trust Conundrum- You’re Asking all ...
PPTX
How to assess and manage cyber risk
PDF
Practical Threat Modeling - WorldParty 2k23 HackMadrid.pdf
PPTX
Threat modelling(system + enterprise)
PPTX
Security Training: #3 Threat Modelling - Practices and Tools
PDF
Threat Modeling to Reduce Software Security Risk
PPTX
Threat Modeling All Day!
PDF
Integrated Security for Software Development and Advanced Penetration Testing...
PPTX
Cyber Security # Lec 3
PPTX
The Journey to Cyber Resilience in a World of Fear, Uncertainty and Doubt
PPTX
Machine Learning: Addressing the Disillusionment to Bring Actual Business Ben...
PPTX
Outpost24 webinar - The new CISO imperative: connecting technical vulnerabili...
PDF
For Public_ Cybersecurity_ Frameworks, Fundamentals, and Foundations 2023.pdf
PPTX
Modernizing, Migrating & Mitigating - Moving to Modern Cloud & API Web Apps W...
PDF
What Every Developer And Tester Should Know About Software Security
PPTX
Scale your Testing and Quality with Automation Engineering and ML - Carlos Ki...
PPTX
Vendors, and Risk, and Tigers, and Bears, Oh My: How to Create a Vendor Revie...
PPTX
O'Reilly SACon 2019 - (Continuous) Threat Modeling - What works?
PPTX
Information Security Metrics - Practical Security Metrics
(ISC)2 Security Congress 2015 - The Cloud Trust Conundrum- You’re Asking all ...
How to assess and manage cyber risk
Practical Threat Modeling - WorldParty 2k23 HackMadrid.pdf
Threat modelling(system + enterprise)
Security Training: #3 Threat Modelling - Practices and Tools
Threat Modeling to Reduce Software Security Risk
Threat Modeling All Day!
Integrated Security for Software Development and Advanced Penetration Testing...
Cyber Security # Lec 3
The Journey to Cyber Resilience in a World of Fear, Uncertainty and Doubt
Machine Learning: Addressing the Disillusionment to Bring Actual Business Ben...
Outpost24 webinar - The new CISO imperative: connecting technical vulnerabili...
For Public_ Cybersecurity_ Frameworks, Fundamentals, and Foundations 2023.pdf
Modernizing, Migrating & Mitigating - Moving to Modern Cloud & API Web Apps W...
What Every Developer And Tester Should Know About Software Security
Scale your Testing and Quality with Automation Engineering and ML - Carlos Ki...
Vendors, and Risk, and Tigers, and Bears, Oh My: How to Create a Vendor Revie...
O'Reilly SACon 2019 - (Continuous) Threat Modeling - What works?
Information Security Metrics - Practical Security Metrics
Ad

More from QA or the Highway (20)

PDF
KrishnaToolComparisionPPT.pdf
PPTX
Ravi Lakkavalli - World Quality Report.pptx
PPTX
Caleb Crandall - Testing Between the Buckets.pptx
PDF
Thomas Haver - Mobile Testing.pdf
PDF
Thomas Haver - Example Mapping.pdf
PDF
Joe Colantonio - Actionable Automation Awesomeness in Testing Farm.pdf
PDF
Sarah Geisinger - Continious Testing Metrics That Matter.pdf
PDF
Jeff Sing - Quarterly Service Delivery Reviews.pdf
PDF
Leandro Melendez - Chihuahua Load Tests.pdf
PDF
Rick Clymer - Incident Management.pdf
PPTX
Robert Fornal - ChatGPT as a Testing Tool.pptx
PDF
Federico Toledo - Extra-functional testing.pdf
PPTX
Andrew Knight - Managing the Test Data Nightmare.pptx
PDF
Melissa Tondi - Automation We_re Doing it Wrong.pdf
PDF
Jeff Van Fleet and John Townsend - Transition from Testing to Leadership.pdf
PPTX
DesiradhaRam Gadde - Testers _ Testing in ChatGPT-AI world.pptx
PDF
Damian Synadinos - Word Smatter.pdf
PDF
Lee Barnes - What Successful Test Automation is.pdf
PPTX
Jordan Powell - API Testing with Cypress.pptx
PPTX
Carlos Kidman - Exploring AI Applications in Testing.pptx
KrishnaToolComparisionPPT.pdf
Ravi Lakkavalli - World Quality Report.pptx
Caleb Crandall - Testing Between the Buckets.pptx
Thomas Haver - Mobile Testing.pdf
Thomas Haver - Example Mapping.pdf
Joe Colantonio - Actionable Automation Awesomeness in Testing Farm.pdf
Sarah Geisinger - Continious Testing Metrics That Matter.pdf
Jeff Sing - Quarterly Service Delivery Reviews.pdf
Leandro Melendez - Chihuahua Load Tests.pdf
Rick Clymer - Incident Management.pdf
Robert Fornal - ChatGPT as a Testing Tool.pptx
Federico Toledo - Extra-functional testing.pdf
Andrew Knight - Managing the Test Data Nightmare.pptx
Melissa Tondi - Automation We_re Doing it Wrong.pdf
Jeff Van Fleet and John Townsend - Transition from Testing to Leadership.pdf
DesiradhaRam Gadde - Testers _ Testing in ChatGPT-AI world.pptx
Damian Synadinos - Word Smatter.pdf
Lee Barnes - What Successful Test Automation is.pdf
Jordan Powell - API Testing with Cypress.pptx
Carlos Kidman - Exploring AI Applications in Testing.pptx

Recently uploaded (20)

PDF
Review of recent advances in non-invasive hemoglobin estimation
PDF
Network Security Unit 5.pdf for BCA BBA.
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PDF
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
PDF
Chapter 3 Spatial Domain Image Processing.pdf
PDF
Spectral efficient network and resource selection model in 5G networks
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PDF
Encapsulation theory and applications.pdf
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PDF
KodekX | Application Modernization Development
PPTX
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PPTX
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PDF
Approach and Philosophy of On baking technology
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PPTX
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PDF
cuic standard and advanced reporting.pdf
Review of recent advances in non-invasive hemoglobin estimation
Network Security Unit 5.pdf for BCA BBA.
Digital-Transformation-Roadmap-for-Companies.pptx
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
Chapter 3 Spatial Domain Image Processing.pdf
Spectral efficient network and resource selection model in 5G networks
Building Integrated photovoltaic BIPV_UPV.pdf
Agricultural_Statistics_at_a_Glance_2022_0.pdf
Encapsulation theory and applications.pdf
Reach Out and Touch Someone: Haptics and Empathic Computing
KodekX | Application Modernization Development
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
Dropbox Q2 2025 Financial Results & Investor Presentation
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
Approach and Philosophy of On baking technology
20250228 LYD VKU AI Blended-Learning.pptx
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
Diabetes mellitus diagnosis method based random forest with bat algorithm
cuic standard and advanced reporting.pdf

Injecting Threat Modeling into the SDLC by Susan Bradley

  • 1. Injecting Threat Modeling into the SDLC Susan Bradley QA or the Highway February 27, 2018
  • 2. About Me • Mom • Young Adult Mystery Writer • Certified in Risk & Information Security Controls (CRISC) • Certified Software Test Engineer (CSTE) • Certified Six Sigma Black Belt (CSSBB) • Certified Associate Business Continuity Professional (ABCP) • Quality Assurance 20+ Years • Lean Management 5 Years
  • 3. Use Case- What Went Wrong?
  • 4. Let’s Break it Down • Equifax Data Breach: Patch wasn’t applied, was it identified as a risk, did risk have an owner? Is there a process for applying patches? Millions of people impacted. • NASA Mars Orbiter Lost: Was the process reviewed from start to finish? When looking at the process, did someone ask, “Hey, are we using the metric or English system?”. Costly, and could have been be deadly. • High Sierra: Enter User Name: Root, No password necessary. Security flaws don’t instill customer confidence • Hawaii Emergency Alert: Live vs. Test Alert was sent. Incited panic. “Wow, the live alert looks too similar to the test alert-maybe we should change that?”
  • 5. What is Threat Modeling? A structured approach that enables you to identify, quantify, and address the security risks associated with an application.
  • 6. When to Use Threat Modeling  New:  Functionality  Application  Process  Vendor Connection or Existing Functionality  Existing:  Functionality  Application  Process  Vendor Connection or Existing Functionality
  • 7. You’ve already done Threat Modeling “When we think ahead of what could go wrong, weigh the risks, and act accordingly, we are "threat modeling"
  • 8. The Software Development Lifecycle- Waterfall
  • 9. The Software Development Lifecycle- Agile
  • 10. Why Inject Threat Modeling?  Mitigate what keeps you up at night  How are we going to handle …?  Find risks before your customer or a hacker does?  Build in quality  Build company’s reputation  Protect your customer’s data
  • 11. Threat Modeling Process  Data Flow Diagram  Understand the system  Identify Threats  Proposed Response: Accept, Avoid, Mitigate, Transfer  Prioritize Mitigation
  • 12. Typical Threat Modeling Session:  Gather documentation  Gather your team-it's not a solo endeavor  Understand your business & technical goals  Agree on meeting date(s) and time(s)  Plan on 1-2 hour focused sessions at a time  Be honest about what is there-it's all about discovery, no blaming or egos  *It's a living process to be revisited when major changes occur
  • 13. Threat Modeling: Requirements Phase What are the log-in authentications? Do we have standards? How will we handle errors? How will we handle data? Who would want to do us harm?
  • 14. Threat Modeling: Design Goal: Decompose the Application.  Look at process end-to-end  Where are the threats?  Are we adding vulnerabilities by integrating with system X?  What are my interactions with external entities?
  • 15. Threat Modeling: Development Goal: Build in Prevention  What are the threats?  How can an attacker bypass?  What can go wrong with database files?  Use STRIDE Method
  • 16. STRIDE Spoofing-Assume identity of client, server, or request Tampering-Alter Contents of request of response Repudiation-Insufficient auditing or record keeping Information Disclosure-Unauthorized release of data Denial of Service-Service not available to authorized users Elevation of Privilege-Bypass authorization system
  • 17. What to do with the Identified?  Determine the potential impact  How likely is it to occur?  What is the risk = likelihood x impact  How do we want to handle the risk?  What is the priority?
  • 18. Ready to Inject Threat Modeling? Requirements Threat Model Design Threat Model Develop Threat Model

Editor's Notes

  • #4: To understand threat modeling, you have to understand the threats
  • #5: Outline threat in each example
  • #8: What is the damage potential, affected users, and
  • #16: Microsoft DREAD method: For Damage: How big would the damage be if the attack succeeded? For Reproducibility: How easy is it to reproduce an attack to work? For Exploitability: How much time, effort, and expertise is needed to exploit the threat? For Affected Users: If a threat were exploited, what percentage of users would be affected? For Discoverability: How easy is it for an attacker to discover this threat?
  • #17: Open Web Application Security Project-OWASP