SlideShare a Scribd company logo
4
Most read
12
Most read
14
Most read
sanjeevjaiswal.com
Threat Modeling for
Everyone
The earlier the better. (2021)
Sanjeev Jaiswal (Jassi)
1
sanjeevjaiswal.com
Agenda
● What and Why Is Threat Modeling
● When We should use Threat Model
● How to implement Threat Model
● STRIDE Hands-On
● What’s Next
2
sanjeevjaiswal.com
Mindset plays an important role here!
3
sanjeevjaiswal.com
What is Threat Modeling
● Design/Model of a system/application from
security point of view
● A list of potential threats
● A list of action to mitigate each threat
● Validating the threats and verifications of
action taken.
4
sanjeevjaiswal.com
Why Threat Modeling
● To build a secure system/application
● Define and build required controls
● Identify threats early and evaluate their risk
● Document threats, controls, risks & Mitigations
● .Security test cases to be performed by
pentesters
5
sanjeevjaiswal.com
Curious case
of Helmet
Does using helmet is enough?
● Types of helmets, which one?
● Having helmet is enough?
● Low quality helmet is ok?
● Wearing helmet just to avoid fine?
● What about helmet expiry date?
● Do we need helmet upgrade?
6
sanjeevjaiswal.com
When to use Threat Modeling
● The sooner the better
● Ideally at design phase
● Whenever system changes
● After an incident
● Possibly at CI/CD ?
7
sanjeevjaiswal.com
Threat Modeling Methodologies
Start with these 4 Questions
1. What are we building?
2. What can go wrong?
3. What are we going to do about it?
4. Did We do a good enough job?
8
sanjeevjaiswal.com
Threat Modeling Types
Basically 3 types:
1. Attacker Centric
2. Application Centric
3. Asset Centric
9
sanjeevjaiswal.com
STRIDE (Developer Focused)
● Spoofing
● Tampering
● Repudiation
● Information Disclosure
● Denial of Service
● Elevation of Privilege
10
sanjeevjaiswal.com
What can go wrong
Threat Desired property
Spoofing Authenticity
Tampering Integrity
Repudiation Non-repudiability
Information disclosure Confidentiality
Denial of Service Availability
Elevation of Privilege Authorization 11
sanjeevjaiswal.com
Batman needs Threat Model
12
sanjeevjaiswal.com
STRIDE for Docker
13
sanjeevjaiswal.com
DFD for Threat Model
Terms that you will use
● Asset: What do you want to protect?
● Threat: What's a potential negative impact or outcome?
● Vulnerability: Spotted Weakness? Threat can be sensed?
● Attack: How to take advantage of the Vulnerability?
● Mitigation: How can we reduce the damage?
14
sanjeevjaiswal.com
DFD for Threat Model
Elements
● Process
● Multi-Process
● Data Flow
● Trust Boundary
● Data Store
● External Entity
15
sanjeevjaiswal.com
DFD for Threat Model Continued ...
How to Perform
● Identify Entry/Exit Points
● Decompose the Application
● Identify the assets
● Identify the trust levels
16
sanjeevjaiswal.com
Sample Threat Model
17
sanjeevjaiswal.com
Common Threat Model mistakes
● Thinking like an attacker while threat modeling
● This process is only for experts or for Architects
● Only inflow, no outflow and reverse as well
● Thinking one size fits all
● Neglecting business impact
● Focusing on vulnerabilities not the threats
18
sanjeevjaiswal.com
Demo
19
sanjeevjaiswal.com
Implement Threat Model: Tools
● MS Threat Modeling tool
● OWASP Threat Dragon Project
● Draw.io
● IriusRisk
● SecuriCAD by foreSeeti
● SD Elements
20
sanjeevjaiswal.com
What’s Next
● DevSecOps Threat Model
● Infra Threat Model
● PASTA (Attacker Focused)
● OCTAVE (Practice Focused)
● VAST (Enterprise Focused)
21
sanjeevjaiswal.com
Must READ Resources
● Threat Modeling Book by Adam Shostack
● Learn Threat Modeling for Security Professionals
● OWASP Application Threat Modeling
● Threat Modeling CheatSheet
● Threat Playbook by we45 (Interesting One)
● Docker Container Security and STRIDE
22
sanjeevjaiswal.com
Useful Resources Continued ...
● Microsoft Secure-SDL: Threat Modeling
● OWASP Application Threat Modeling
● Threat Modeling why how when (Nice Article)
● Kubernetes Threat Model (pdf)
● Docker Security: Threat Modeling
● Container as a Service Threat Analysis (pdf)
23
sanjeevjaiswal.com
Thank you
Happy Learning.
Share if you care.
24

More Related Content

PDF
Threat Modeling Using STRIDE
PDF
Secure Coding and Threat Modeling
PPTX
Natural Language Processing (NLP)
PPTX
Pasta Threat Modeling
PDF
Lexical analysis - Compiler Design
PDF
Secure Design: Threat Modeling
PPTX
Threat Modeling In 2021
PPTX
7 Steps to Threat Modeling
Threat Modeling Using STRIDE
Secure Coding and Threat Modeling
Natural Language Processing (NLP)
Pasta Threat Modeling
Lexical analysis - Compiler Design
Secure Design: Threat Modeling
Threat Modeling In 2021
7 Steps to Threat Modeling

What's hot (20)

PPT
Introduction to Web Application Penetration Testing
PDF
Threat Hunting
PDF
Application Threat Modeling
PPTX
Threat modelling with_sample_application
PPTX
How to Test for The OWASP Top Ten
PDF
Purple Teaming the Cyber Kill Chain: Practical Exercises for Everyone Sector...
PPTX
Vulnerabilities in modern web applications
PPTX
Vulnerability and Assessment Penetration Testing
PPTX
Bug Bounty 101
PDF
Cyber Threat Intelligence
PPT
Application Threat Modeling
PDF
Threat Modeling Everything
PPTX
Penetration testing reporting and methodology
ODP
Mobile App Security Testing -2
PDF
Threat Intelligence
PPTX
Cyber espionage nation state-apt_attacks_on_the_rise
PPTX
Introduction to Malware Analysis
PDF
Hacking and Defending APIs - Red and Blue make Purple.pdf
PPTX
Android Application Penetration Testing - Mohammed Adam
Introduction to Web Application Penetration Testing
Threat Hunting
Application Threat Modeling
Threat modelling with_sample_application
How to Test for The OWASP Top Ten
Purple Teaming the Cyber Kill Chain: Practical Exercises for Everyone Sector...
Vulnerabilities in modern web applications
Vulnerability and Assessment Penetration Testing
Bug Bounty 101
Cyber Threat Intelligence
Application Threat Modeling
Threat Modeling Everything
Penetration testing reporting and methodology
Mobile App Security Testing -2
Threat Intelligence
Cyber espionage nation state-apt_attacks_on_the_rise
Introduction to Malware Analysis
Hacking and Defending APIs - Red and Blue make Purple.pdf
Android Application Penetration Testing - Mohammed Adam
Ad

Similar to Threat Modeling Basics with Examples (20)

PDF
Practical Threat Modeling - WorldParty 2k23 HackMadrid.pdf
PPTX
Value-driven threat modeling: Security by design - Avi Douglen - DevOpsDays T...
PDF
Synopsys Security Event Israel Presentation: Value Driven Threat Modeling
PDF
Security by default - Building continuous cyber-resilience.
PDF
OWASP based Threat Modeling Framework
PDF
Managing Application Security Risk in Enterprises - Thoughts and recommendations
PDF
DevSecOps What Why and How
PPTX
NTXISSACSC2 - Threat Modeling Part 1 - Overview by Brad Andrews
PDF
Year Zero
PDF
Threat Modeling to Reduce Software Security Risk
PDF
Building Security Teams
PPTX
Qualifying questions for CrowdStrike.pptx
PDF
Securing the Internet from Cyber Criminals
PPTX
Threat Modeling Lessons from Star Wars
PDF
Security overview 2
PDF
When Insiders ATT&CK!
PPTX
Rethinking Risk-Based Project Management in the Emerging IT initiatives.pptx
PPTX
Lecture-10 about language of community.pptx
PPTX
Ethical Hacking Conference 2015- Building Secure Products -a perspective
PPTX
Threat Modeling And Analysis
Practical Threat Modeling - WorldParty 2k23 HackMadrid.pdf
Value-driven threat modeling: Security by design - Avi Douglen - DevOpsDays T...
Synopsys Security Event Israel Presentation: Value Driven Threat Modeling
Security by default - Building continuous cyber-resilience.
OWASP based Threat Modeling Framework
Managing Application Security Risk in Enterprises - Thoughts and recommendations
DevSecOps What Why and How
NTXISSACSC2 - Threat Modeling Part 1 - Overview by Brad Andrews
Year Zero
Threat Modeling to Reduce Software Security Risk
Building Security Teams
Qualifying questions for CrowdStrike.pptx
Securing the Internet from Cyber Criminals
Threat Modeling Lessons from Star Wars
Security overview 2
When Insiders ATT&CK!
Rethinking Risk-Based Project Management in the Emerging IT initiatives.pptx
Lecture-10 about language of community.pptx
Ethical Hacking Conference 2015- Building Secure Products -a perspective
Threat Modeling And Analysis
Ad

Recently uploaded (20)

PPTX
Programs and apps: productivity, graphics, security and other tools
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PPTX
Spectroscopy.pptx food analysis technology
DOCX
The AUB Centre for AI in Media Proposal.docx
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PDF
Empathic Computing: Creating Shared Understanding
PDF
NewMind AI Weekly Chronicles - August'25 Week I
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PDF
Encapsulation theory and applications.pdf
PDF
KodekX | Application Modernization Development
PDF
MIND Revenue Release Quarter 2 2025 Press Release
PDF
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
PDF
Machine learning based COVID-19 study performance prediction
PDF
Approach and Philosophy of On baking technology
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
Programs and apps: productivity, graphics, security and other tools
Advanced methodologies resolving dimensionality complications for autism neur...
Per capita expenditure prediction using model stacking based on satellite ima...
Spectroscopy.pptx food analysis technology
The AUB Centre for AI in Media Proposal.docx
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
Empathic Computing: Creating Shared Understanding
NewMind AI Weekly Chronicles - August'25 Week I
Diabetes mellitus diagnosis method based random forest with bat algorithm
Dropbox Q2 2025 Financial Results & Investor Presentation
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
Digital-Transformation-Roadmap-for-Companies.pptx
Reach Out and Touch Someone: Haptics and Empathic Computing
Encapsulation theory and applications.pdf
KodekX | Application Modernization Development
MIND Revenue Release Quarter 2 2025 Press Release
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
Machine learning based COVID-19 study performance prediction
Approach and Philosophy of On baking technology
Agricultural_Statistics_at_a_Glance_2022_0.pdf

Threat Modeling Basics with Examples