Practical Threat Modeling
David Sastre Medina
Principal Security Engineer
Juan Vicente Herrera Ruiz de Alejo
Senior Cloud Architect
1
What we’ll
discuss today
● What is Threat Modeling?
● Why do Threat Modeling?
● How to do Threat Modeling?
● Security in the SDLC
● Proactive Systems Security
● What We Have Come To Value?
Agenda
2
3
What Is Threat
Modeling
4
AThreat Model is a conceptual representation of a
system, and the threats to it that have been identified.
● Repeatable process to find and address all threats to
your project or product
● Define countermeasures to prevent or mitigate the
effects of the threats
● Consider, document and discuss security in a
structured way
What is Threat Modeling?
Threat Modeling Process
5
1. DFD
diagram
2. Identify
Threats
3. Mitigate
4. Validate
What are we working on?
Create a data flow diagram to
understand how information flows
through the system
What can go wrong?
Analyse the model to identify
potential threats
What are we going to do
about it?
Indicate which threats are already
mitigated and determine
how the remaining threats would
be mitigated
Did we do a good job?
Validate the system against recorded
threat model. Continue to mitigate
any open issues
6
Why do Threat
Modeling?
Why do Threat Modeling
7
● More Secure Services
● Reduced cost by finding design flaws early and before
release
● Reduced exposure to weaknesses other methods may
not uncover
● Make rational decisions about how to address
knowable security threats
● Consolidate dispersed knowledge
8
How to do
Threat Modeling
How to do Threat Modeling
9
Methodology
● Existing and Custom Frameworks
● Proactive Controls
● Automation
● Brainstorming Sessions
STRIDE
10
Threat Desired property Threat Definition
Spoofing Authenticity Pretending to be something or someone other
than yourself
Tampering Integrity Modifying something on disk, network, memory,
or elsewhere
Repudiation Non-repudiability Claiming that you didn't do something or were
not responsible; can be honest or false
Information disclosure Confidentiality Providing information to someone not authorized
to access it
Denial of service Availability Exhausting resources needed to provide service
Elevation of privilege Authorization Allowing someone to do something they are not
authorized to do
How to do Threat Modeling
Proactive Controls
11
Control Scope What we want to mitigate
Authentication Related to the identification of users Impersonating someone known and
trusted (spoofing)
Authorisation Related to authorization of users and
assessment of rights
Privilege escalation
Data security Confidentiality, Integrity, Availability Disclosure, Tampering, DoS
Audit and
logging
Related to auditing of actions or logging
of potential security events
Non-Repudiation
Configuration Related to secure configurations of
servers, devices or software
Passwords and other credentials
stored in plain text files
Unpatched software and firmware
vulnerabilities
Resilience Scaling, fault tolerance etc Denial of service / system failure
Input Fail safe design SQL Injection, Cross Site Scripting
How to do Threat Modeling
How to do Threat Modeling
12
Example Data Flow Diagram
13
Security in
the SDLC
Security in the SDLC
14
Supply Chain Security
● Shift Left
● Involve security thinking at every phase of software
development
● Make small, positive improvements
● Have a Roadmap
Supply Chain Security
15
16
Proactive
Systems
Security
Proactive Systems Security
17
Preemptive Security in the Environment
● Context
● Hardening as mitigation
● Configuration and Operating Environment
● Processes and Policies
● Architecture and Design
● Include Human Actors
18
What have we
come to value
What have we come to value?
19
● A culture of finding and fixing design issues over
checkbox compliance
● People and collaboration over processes,
methodologies, and tools
● A journey of understanding over a security or privacy
snapshot
● Continuous refinement over a single delivery
What We Have Come To Value?
What have we come to value?
20
● Technical Knowledge
● Time
● Empathy
● Give Threat Modeling a Try!
What Do You Need to Start
21
I Have Questions
Resources
22
● How to do Threat Modeling?
● MITRE D3FEND: A knowledge graph of cybersecurity
countermeasures
● Threat Modeling in the enterprise: Understanding the basics
● OWASP Threat Modeling Cheat Sheet
● Threat Modeling: 12 Available Methods
● Learning Threat Modeling for Security Professionals
● Threat Modeling, or Architectural Risk Analysis
● Tactical Threat Modeling
● Threat Modeling in 2019
● How Threat Modeling Helps Discover Vulnerabilities
● What Exactly Does a Threat Modeler do?
● Kubernetes Operator: Good Security Practices

More Related Content

PDF
Security by default - Building continuous cyber-resilience.
PDF
Security Fundamentals and Threat Modelling
DOCX
Security architecture principles isys 0575general att
PPTX
Injecting Threat Modeling into the SDLC by Susan Bradley
PPTX
Security Training: #3 Threat Modelling - Practices and Tools
PPT
002.itsecurity bcp v1
PDF
Threat Modeling to Reduce Software Security Risk
Security by default - Building continuous cyber-resilience.
Security Fundamentals and Threat Modelling
Security architecture principles isys 0575general att
Injecting Threat Modeling into the SDLC by Susan Bradley
Security Training: #3 Threat Modelling - Practices and Tools
002.itsecurity bcp v1
Threat Modeling to Reduce Software Security Risk

Similar to Practical Threat Modeling - WorldParty 2k23 HackMadrid.pdf (20)

PDF
Security overview 2
PPTX
PPTX
Threat modelling(system + enterprise)
PDF
Strategic Leadership for Managing Evolving Cybersecurity Risks
PDF
Secure Software Design and Secure Programming
PDF
Security by Design: An Introduction to Drupal Security
PDF
Security by design: An Introduction to Drupal Security
PDF
Cybersecurity_Security_architecture_2023.pdf
PPTX
Threat Modeling Web Applications
PDF
TrustArc Webinar - Unlocking AI Potential: Leveraging PIA Processes for Compr...
PDF
Threat Modeling workshop by Robert Hurlbut
PDF
Threat Modeling in the Cloud
PPT
Information Technology Security Basics
PDF
Threat Modeling Basics with Examples
PPTX
Emerging New Threats And Top CISO Priorities In 2022 (Chennai)
PDF
Your Skill Boost Masterclass Online Safety and Cybersecurity Tips
PPTX
CISSP Domain 03 Security Architecture and Engineering.pptx
PDF
For Public_ Cybersecurity_ Frameworks, Fundamentals, and Foundations 2023.pdf
PDF
Securing the Internet from Cyber Criminals
PDF
Security_by_Design.pdf
Security overview 2
Threat modelling(system + enterprise)
Strategic Leadership for Managing Evolving Cybersecurity Risks
Secure Software Design and Secure Programming
Security by Design: An Introduction to Drupal Security
Security by design: An Introduction to Drupal Security
Cybersecurity_Security_architecture_2023.pdf
Threat Modeling Web Applications
TrustArc Webinar - Unlocking AI Potential: Leveraging PIA Processes for Compr...
Threat Modeling workshop by Robert Hurlbut
Threat Modeling in the Cloud
Information Technology Security Basics
Threat Modeling Basics with Examples
Emerging New Threats And Top CISO Priorities In 2022 (Chennai)
Your Skill Boost Masterclass Online Safety and Cybersecurity Tips
CISSP Domain 03 Security Architecture and Engineering.pptx
For Public_ Cybersecurity_ Frameworks, Fundamentals, and Foundations 2023.pdf
Securing the Internet from Cyber Criminals
Security_by_Design.pdf

More from Juan Vicente Herrera Ruiz de Alejo (20)

PDF
Un puente enre MLops y Devops con Openshift AI
PDF
PDF
OpenShift Multicluster
PDF
Deploying Minecraft with Ansible
PDF
Tell me how you provision and I'll tell you how you are
PDF
Santander DevopsandCloudDays 2021 - Hardening containers.pdf
PDF
X by orange; una telco en la nube
PDF
Dorsal carrera de la mujer ROSAE 2017
PDF
Cartel carrera de la mujer ROSAE 2017
PDF
Volkswagen Prague Marathon 2017
PDF
Plan de entrenamiento Maratón de Madrid Mes 3
PDF
Plan de entrenamiento Maratón de Madrid Mes 2
PDF
Plan de entrenamiento Maratón de Madrid Mes 1
PDF
Cartel carrera de la mujer ROSAE 2014
PPT
AWS migration: getting to Data Center heaven with AWS and Chef
ODP
Devops madrid: successful case in AWS
ODP
Devops Madrid Marzo - Caso de uso en AWS
ODP
Configuration management with Chef
ODP
DevOps and Chef improve your life
ODP
MongoDB Devops Madrid February 2012
Un puente enre MLops y Devops con Openshift AI
OpenShift Multicluster
Deploying Minecraft with Ansible
Tell me how you provision and I'll tell you how you are
Santander DevopsandCloudDays 2021 - Hardening containers.pdf
X by orange; una telco en la nube
Dorsal carrera de la mujer ROSAE 2017
Cartel carrera de la mujer ROSAE 2017
Volkswagen Prague Marathon 2017
Plan de entrenamiento Maratón de Madrid Mes 3
Plan de entrenamiento Maratón de Madrid Mes 2
Plan de entrenamiento Maratón de Madrid Mes 1
Cartel carrera de la mujer ROSAE 2014
AWS migration: getting to Data Center heaven with AWS and Chef
Devops madrid: successful case in AWS
Devops Madrid Marzo - Caso de uso en AWS
Configuration management with Chef
DevOps and Chef improve your life
MongoDB Devops Madrid February 2012

Recently uploaded (20)

PPTX
Microsoft Excel 365/2024 Beginner's training
PPT
What is a Computer? Input Devices /output devices
PDF
Architecture types and enterprise applications.pdf
PPTX
Chapter 5: Probability Theory and Statistics
PPTX
Configure Apache Mutual Authentication
PPTX
MicrosoftCybserSecurityReferenceArchitecture-April-2025.pptx
PDF
sustainability-14-14877-v2.pddhzftheheeeee
PPTX
Custom Battery Pack Design Considerations for Performance and Safety
PDF
From MVP to Full-Scale Product A Startup’s Software Journey.pdf
PDF
1 - Historical Antecedents, Social Consideration.pdf
PDF
ENT215_Completing-a-large-scale-migration-and-modernization-with-AWS.pdf
PPTX
Final SEM Unit 1 for mit wpu at pune .pptx
PDF
A comparative study of natural language inference in Swahili using monolingua...
PDF
A Late Bloomer's Guide to GenAI: Ethics, Bias, and Effective Prompting - Boha...
PDF
Consumable AI The What, Why & How for Small Teams.pdf
PPTX
Modernising the Digital Integration Hub
PDF
TrustArc Webinar - Click, Consent, Trust: Winning the Privacy Game
PDF
STKI Israel Market Study 2025 version august
PDF
A review of recent deep learning applications in wood surface defect identifi...
PDF
Getting started with AI Agents and Multi-Agent Systems
Microsoft Excel 365/2024 Beginner's training
What is a Computer? Input Devices /output devices
Architecture types and enterprise applications.pdf
Chapter 5: Probability Theory and Statistics
Configure Apache Mutual Authentication
MicrosoftCybserSecurityReferenceArchitecture-April-2025.pptx
sustainability-14-14877-v2.pddhzftheheeeee
Custom Battery Pack Design Considerations for Performance and Safety
From MVP to Full-Scale Product A Startup’s Software Journey.pdf
1 - Historical Antecedents, Social Consideration.pdf
ENT215_Completing-a-large-scale-migration-and-modernization-with-AWS.pdf
Final SEM Unit 1 for mit wpu at pune .pptx
A comparative study of natural language inference in Swahili using monolingua...
A Late Bloomer's Guide to GenAI: Ethics, Bias, and Effective Prompting - Boha...
Consumable AI The What, Why & How for Small Teams.pdf
Modernising the Digital Integration Hub
TrustArc Webinar - Click, Consent, Trust: Winning the Privacy Game
STKI Israel Market Study 2025 version august
A review of recent deep learning applications in wood surface defect identifi...
Getting started with AI Agents and Multi-Agent Systems

Practical Threat Modeling - WorldParty 2k23 HackMadrid.pdf

  • 1. Practical Threat Modeling David Sastre Medina Principal Security Engineer Juan Vicente Herrera Ruiz de Alejo Senior Cloud Architect 1
  • 2. What we’ll discuss today ● What is Threat Modeling? ● Why do Threat Modeling? ● How to do Threat Modeling? ● Security in the SDLC ● Proactive Systems Security ● What We Have Come To Value? Agenda 2
  • 4. 4 AThreat Model is a conceptual representation of a system, and the threats to it that have been identified. ● Repeatable process to find and address all threats to your project or product ● Define countermeasures to prevent or mitigate the effects of the threats ● Consider, document and discuss security in a structured way What is Threat Modeling?
  • 5. Threat Modeling Process 5 1. DFD diagram 2. Identify Threats 3. Mitigate 4. Validate What are we working on? Create a data flow diagram to understand how information flows through the system What can go wrong? Analyse the model to identify potential threats What are we going to do about it? Indicate which threats are already mitigated and determine how the remaining threats would be mitigated Did we do a good job? Validate the system against recorded threat model. Continue to mitigate any open issues
  • 7. Why do Threat Modeling 7 ● More Secure Services ● Reduced cost by finding design flaws early and before release ● Reduced exposure to weaknesses other methods may not uncover ● Make rational decisions about how to address knowable security threats ● Consolidate dispersed knowledge
  • 9. How to do Threat Modeling 9 Methodology ● Existing and Custom Frameworks ● Proactive Controls ● Automation ● Brainstorming Sessions
  • 10. STRIDE 10 Threat Desired property Threat Definition Spoofing Authenticity Pretending to be something or someone other than yourself Tampering Integrity Modifying something on disk, network, memory, or elsewhere Repudiation Non-repudiability Claiming that you didn't do something or were not responsible; can be honest or false Information disclosure Confidentiality Providing information to someone not authorized to access it Denial of service Availability Exhausting resources needed to provide service Elevation of privilege Authorization Allowing someone to do something they are not authorized to do How to do Threat Modeling
  • 11. Proactive Controls 11 Control Scope What we want to mitigate Authentication Related to the identification of users Impersonating someone known and trusted (spoofing) Authorisation Related to authorization of users and assessment of rights Privilege escalation Data security Confidentiality, Integrity, Availability Disclosure, Tampering, DoS Audit and logging Related to auditing of actions or logging of potential security events Non-Repudiation Configuration Related to secure configurations of servers, devices or software Passwords and other credentials stored in plain text files Unpatched software and firmware vulnerabilities Resilience Scaling, fault tolerance etc Denial of service / system failure Input Fail safe design SQL Injection, Cross Site Scripting How to do Threat Modeling
  • 12. How to do Threat Modeling 12 Example Data Flow Diagram
  • 14. Security in the SDLC 14 Supply Chain Security ● Shift Left ● Involve security thinking at every phase of software development ● Make small, positive improvements ● Have a Roadmap
  • 17. Proactive Systems Security 17 Preemptive Security in the Environment ● Context ● Hardening as mitigation ● Configuration and Operating Environment ● Processes and Policies ● Architecture and Design ● Include Human Actors
  • 19. What have we come to value? 19 ● A culture of finding and fixing design issues over checkbox compliance ● People and collaboration over processes, methodologies, and tools ● A journey of understanding over a security or privacy snapshot ● Continuous refinement over a single delivery What We Have Come To Value?
  • 20. What have we come to value? 20 ● Technical Knowledge ● Time ● Empathy ● Give Threat Modeling a Try! What Do You Need to Start
  • 22. Resources 22 ● How to do Threat Modeling? ● MITRE D3FEND: A knowledge graph of cybersecurity countermeasures ● Threat Modeling in the enterprise: Understanding the basics ● OWASP Threat Modeling Cheat Sheet ● Threat Modeling: 12 Available Methods ● Learning Threat Modeling for Security Professionals ● Threat Modeling, or Architectural Risk Analysis ● Tactical Threat Modeling ● Threat Modeling in 2019 ● How Threat Modeling Helps Discover Vulnerabilities ● What Exactly Does a Threat Modeler do? ● Kubernetes Operator: Good Security Practices