SlideShare a Scribd company logo
MARET Consulting | Boulevard Georges Favon 43 | CH 1204 Geneva | Tél +41 22 575 30 35 | info@maret-consulting.ch | www.maret-consulting.ch




        iPad net-Banking Project
       Technical Risk Assessment




                   Sylvain Maret / Security Architect / 2012-05-24
                                     @smaret




                                                                                                                                             Conseil en technologies
Agenda




                   Context

                   Technical Risk Assessment approach
                             A six step process
                             Threat Model – DFD
                             STRIDE Model


                   Open discussion


www.maret-consulting.ch                                  Conseil en technologies
Context

www.maret-consulting.ch             Conseil en technologies
Context




                   Business case: enable customer access to
                    portfolio performance reports from mobile
                    equipments (iPad) located outside the
                    controlled network.
www.maret-consulting.ch                                    Conseil en technologies
Actors        Security Product




              ACME Bank




                               Web Agency
www.maret-consulting.ch                      Conseil en technologies
The TRA relies on a series of six activities:




#1         • System characterization
#2         • Threat identification
#3         • Vulnerabilities identification
#4         • Impacts analysis
#5         • Risk characterization
#6         • Risk treatment and mitigation
 www.maret-consulting.ch                                     Conseil en technologies
Step #1




System characterization
www.maret-consulting.ch             Conseil en technologies
#1 - Appropriate safeguards




                   The selected solution shall implement the
                    appropriate safeguards to maintain the overall
                    security to its expected level.


            Required level



                               C    I     A
www.maret-consulting.ch                                      Conseil en technologies
#1




                   Ensure service integrity:
                             Uncontrolled client systems mean unpredictable
                              request behavior


                   Prevent access from:
                             Offensive / hostile / corrupt requests


www.maret-consulting.ch                                                  Conseil en technologies
#1




                   Ensure information confidentiality:
                             While data travels across uncontrolled networks
                             While the client application is “offline” (turned-off)
                             While the client application is “online” (running)


                   Prevent access from:
                             Network capture:
                                  Sniffers, gateways, cache proxies, MitM, etc.
                             Local capture:
                                  Unsecure backups, memory-card access
                                  Data interception by locally installed malware      Conseil en technologies
www.maret-consulting.ch
#1




                   Consider project specific risks:
                             Outsourced vs. in-house development
                                   where will security assurance come from?


                             Multi-disciplinary project involving three major actors:
                                  The Bank (Acme - IT projects)
                                  The portfolio performance reporting application (Web Agency)
                                  The sandboxing application (Sysmosoft)


                             Who will be responsible for key security aspects?

www.maret-consulting.ch                                                                  Conseil en technologies
Step #2




             Threat identification
www.maret-consulting.ch              Conseil en technologies
#2




                   Building a threat model
                             Decompose the Application
                                  Diagramming - Data Flow Diagram - DFD


                             Determine and Rank Threats
                                  STRIDE model
www.maret-consulting.ch                                                    Conseil en technologies
#2 - Data Flow Diagram (DFD)




                                                                  Process
        External entity               Multiple Process




                Data store                 Data flow     Trust Boundary


www.maret-consulting.ch                                              Conseil en technologies
#2 - DFD - iPad net-Banking




www.maret-consulting.ch                   Conseil en technologies
#2 – STRIDE Model




                          Threat Categories
www.maret-consulting.ch                       Conseil en technologies
#2 - Threat Agents




www.maret-consulting.ch          Conseil en technologies
#2 - Threats - iPad net-Banking - Example




www.maret-consulting.ch                                 Conseil en technologies
#2 - Different threats affect each type of element


         DFD               Threat
                                             Comment                S   T R   I        D E
          ID                 ID


                                       Unsecure backups
          2                           Memory-card access
                            T1
       (iPad)                       Data interception by locally
                                        installed malware

      3
                                     Sniffers, gateways, cache
 (Transport-                T2
                                         proxies, MitM, etc.
  Internet)


      7                             Offensive / hostile / corrupt
                            T3
(Banking- App)                               requests


 www.maret-consulting.ch                                                      Conseil en technologies
Step #3




Vulnerabilities identification
www.maret-consulting.ch             Conseil en technologies
#3 - Security controls - Example

   Threat                              Family                              Controls
     ID
        T1                Feature: local mobile application   Secure offline data storage
                          sandboxing                          Secure online data storage (in-
                                                              memory storage)
                                                              Secure environment validation
                                                              (OS + client application integrity)
                                                              Safeguards against malware
        T2                Feature: data transport security    Confidential transport

        T3                Feature: secure architecture        - defense in depth
                                                              - privilege separation
                                                              - trusted links & endpoint
        T3                Process: secure software            Presence of software security
                          development                         assurance controls in each
                                                              development lifecycle:
                                                              - Outsourced Dev
www.maret-consulting.ch
                                                              - Acme Bank                  Conseil en technologies
#3 - Vulnerabilities identification

Threat                           Controls                V-ID       Vulnerabilities
  ID
 T1            Secure offline data storage               V100              ??
               Secure online data storage (in-memory
               storage)
               Secure environment validation (OS +
               client application integrity)
               Safeguards against malware
 T2            Confidential transport                    V200   No Application Level
                                                                Data Security
 T3            - defense in depth                        V300   No Hardening Strategy
               - privilege separation                           at Service Layer
               - trusted links & endpoint
 T3            Presence of software security assurance   V400   Poor SDLC activities
               controls in each development lifecycle:
               - Outsourced Dev
               - Acme Bank
  www.maret-consulting.ch                                                       Conseil en technologies
#3 - V100 - unknown




                                  Data Sharing between apps ?

                                        Device Jailbreaking ?


                                      Malicious legal App. ?

www.maret-consulting.ch                                  Conseil en technologies
#3 - V200 - No Application Level Data Security




               Banking App


www.maret-consulting.ch                                      Conseil en technologies
#3 - V300 - No Hardening Strategy at Service Layer




                                                 No XML Firewall

                                                 No Mutual Trust SSL at
                                                 WS Transport Level

                                                 No Hardening at OS &
                                                 Service Level




www.maret-consulting.ch                                            Conseil en technologies
#3 - V400 - Poor SDLC activities




SDL de Microsoft
  www.maret-consulting.ch                        Conseil en technologies
#3 - Security Assurance during development

          Project phase           Assurance                 Security
                                  level                     activities
                                                 -Security requirements
                Analysis                         - Compliance reqs., policy


                                                 - Secure design / Design security review
                                                 - Threat model
                  Design                         - Security testing plan

                                                 - Safe APIs
        Implementation                           - Secure coding / defensive programming

                                     ?
                                                 - Automated source code analysis

                                                 - Security testing
             Verification                        - Penetration testing

                                                 - Secure default configuration
                 Delivery                        - Hardening / secure deployment guides
                                                 - Configuration validation

                                                 - Incident response process
             Operations                          - Threat / vulnerability management

www.maret-consulting.ch                                                                Conseil en technologies
#3 – Web Agency: software development security assurance

           Project phase       Assurance                   Security
                               level                       activities

                Analysis

                                                - involvement of a security architect
                                                during the design process
                  Design

                                                - use of automated code quality analysis
        Implementation                          tools



             Verification


                 Delivery

                                                - experience with customers conducting
             Operations                         regular security evaluations
www.maret-consulting.ch                                                                 Conseil en technologies
#3 - Acme Bank: software development security assurance

                                Assurance
           Project phase                                 Security
                                level
                                                         activities

                Analysis


                  Design


        Implementation
                                    ?
             Verification


                 Delivery


             Operations
www.maret-consulting.ch                                               Conseil en technologies
#3 - Software development security assurance: Summary



 Actor                     Assurance                               Conclusions
                           level




                                       - Assurance level is low. Acme Bank shall agree with
Outsourced Dev                         vendor on minimum security assurance requirements along the
                                       project, or establish a clear statement of responsibilities (SLA).



                                       - Assurance level is low. Acme Bank shall define minimum
   Acme Bank                   ?       security assurance requirements with project management.




 www.maret-consulting.ch                                                                    Conseil en technologies
Step #4




                          Impact analysis
www.maret-consulting.ch                     Conseil en technologies
#4 – Impact analysis – Example


V-ID                 Description                        Severity   Exposure


V-100                Information disclosure on iPad      HIGH      Additional controls
                                                                   needed




V-200                Information disclosure on data     MEDIUM Additional controls
                     transport                                 needed

V-300                Intrusion on Banking Application    HIGH      Additional controls
                                                                   needed

V-400                Intrusion on Banking Application    HIGH      Additional controls
                                                                   needed

 www.maret-consulting.ch                                                      Conseil en technologies
Step #5




                          Risk estimation
www.maret-consulting.ch                     Conseil en technologies
#5 – Risk estimation - Example

                             Tech.     Business
R-ID        V-ID                                        Description       Likelihood          Severity
                            Impact      Impact
R-1 V-200 Confidentiality Compliance               Theft of credentials   MEDIUM               HIGH
                          Reputation               or personal data
                                                   during transport
R-2 V-300 Integrity                  Compliance    User input               LOW                HIGH
    V-400                            Reputation,   tampering attempts
                                     Operations    resulting in system
                                                   compromise
R-3 --                        --          --                --                --                     --

R-4 --                        --          --                --                --                     --

R-5

R-6


  www.maret-consulting.ch                                                              Conseil en technologies
Step #6




Risk treatment and mitigation
 www.maret-consulting.ch             Conseil en technologies
#6 – Security controls - Example


                                                                     Reco.
 ID           Risk                      Description                           Decision
                                                                      MC

SC.1 R-1                   Perform a pentest on the iPad           Mitigate
                           application

SC.2 R-1                   Implement Data encryption for transport Mitigate



SC.3 R-2                   Deploy a XML Firewall in front of Web   Mitigate
                           Service

SC.4 R-2                   Perform code review                     Mitigate
                           Perform Pentest


 www.maret-consulting.ch                                                        Conseil en technologies
Conclusion




                   Security in mind during the project

                   Iterative process
                             Risk Assessment during the project
                             Risk Assessment after deployment


                   Threat Modeling
                             A new approach


                   A guideline for all project
www.maret-consulting.ch                                            Conseil en technologies
Questions ?




 www.maret-consulting.ch   Conseil en technologies
Who am I?




                   Security Expert
                             17 years of experience in ICT Security
                             Principal Consultant at MARET Consulting
                             Expert at Engineer School of Yverdon & Geneva University
                             Swiss French Area delegate at OpenID Switzerland
                             Co-founder Geneva Application Security Forum
                             OWASP Member
                             Author of the blog: la Citadelle Electronique
                             http://ch.linkedin.com/in/smaret or @smaret
                             http://www.slideshare.net/smaret


                   Chosen field
                             AppSec & Digital Identity Security
www.maret-consulting.ch                                                                  Conseil en technologies
References




                   https://www.owasp.org/index.php/Application_Threat_
                    Modeling
                   http://msdn.microsoft.com/en-us/library/ff648644.aspx
                   http://en.wikipedia.org/wiki/Threat_model
                   http://www.microsoft.com/security/sdl/default.aspx



                   http://www.appsec-forum.ch/

www.maret-consulting.ch                                            Conseil en technologies
"Le conseil et l'expertise pour le choix et la mise

                     en oeuvre des technologies innovantes dans la sécurité

                          des systèmes d'information et de l'identité numérique"




www.maret-consulting.ch                                                              Conseil en technologies
Backup Slides




www.maret-consulting.ch     Conseil en technologies
#2 - Understanding the threats

Threat                        Property          Definition             Example
Spoofing                      Authentication    Impersonating          Pretending to be any of billg, xbox.com or
                                                something or           a system update
                                                someone else.
Tampering                     Integrity         Modifying data or      Modifying a game config file on disk, or a
                                                code                   packet as it traverses the network

Repudiation                   Non-repudiation   Claiming to have not “I didn’t cheat!”
                                                performed an action

Information                   Confidentiality   Exposing               Reading key material from an app
Disclosure                                      information to
                                                someone not
                                                authorized to see it
Denial of Service             Availability      Deny or degrade        Crashing the web site, sending a packet
                                                service to users       and absorbing seconds of CPU time, or
                                                                       routing packets into a black hole

Elevation of                  Authorization     Gain capabilities      Allowing a remote internet user to run
Privilege                                       without proper         commands is the classic example, but
                                                authorization          running kernel code from lower trust levels
    www.maret-consulting.ch                                            is also EoP                      Conseil en technologies

Source: Microsoft SDL Threat Modeling
#3 - V400 - Poor SDLC activities




 Software assurance maturity models: SAMM (OWASP)


www.maret-consulting.ch                        Conseil en technologies
#2 – Data Flow Diagram




     External                                    Data
                               Process                                Data Store
      entity                                                Flow

• People                    • DLLs               • Function call     • Database
• Other systems             • EXEs               • Network traffic   • File
• Microsoft.com             • Components         • Etc…              • Registry
• etc…                      • Services                               • Shared
                            • Web Services                             Memory
                            • Assemblies                             • Queue/Stack
                            • etc…                                   • etc…


                           Trust Boundary

                            • Process boundary
                            • File system
 www.maret-consulting.ch                                                  Conseil en technologies

More Related Content

PDF
Solutions for PCI DSS Compliance
PPTX
Trend Micro - Targeted attacks: Have you found yours?
PDF
Empowering the business while efficiently mitigating risks - Eva Chen (Trend ...
PPTX
Security assessment for financial institutions
PDF
28032012 Irma vander Ploeg: e portfolio als digitale identiteit
PPTX
Smart, Data-Centric Security for the Post-PC Era
PDF
Introduction - Trend Micro Deep Security
PDF
Trend Micro Dec 6 Toronto VMUG
Solutions for PCI DSS Compliance
Trend Micro - Targeted attacks: Have you found yours?
Empowering the business while efficiently mitigating risks - Eva Chen (Trend ...
Security assessment for financial institutions
28032012 Irma vander Ploeg: e portfolio als digitale identiteit
Smart, Data-Centric Security for the Post-PC Era
Introduction - Trend Micro Deep Security
Trend Micro Dec 6 Toronto VMUG

What's hot (19)

PPTX
Trend Micro - 13martie2012
PPTX
Targeted Attacks: Have you found yours?
PDF
Trend Micro - Virtualization and Security Compliance
PPT
Arrow ECS IBM Partner Jam - Security Update - Vicki Cooper - IBM
PDF
Moving target-defense
PDF
Security model-of-sip-d2-05 at kishore
PPTX
FROM STRATEGY TO ACTION - Vasil Tsvimitidze
PPT
Trend micro real time threat management press presentation
PDF
Digital Watermarking Applications and Techniques: A Brief Review
PDF
Ehc brochure
PPTX
SCIT Labs - intrusion tolerant systems
PDF
SmartCard Forum 2009 - New trends in smart-cards technology
PDF
WP82 Physical Security in Mission Critical Facilities
PDF
Info security - mobile approach
PDF
DSS ITSEC Conference 2012 - SIEM Q1 Labs IBM Security Systems Intelligence
DOCX
Digitalwatermarking
PDF
Retail Stores and Wireless Security—Recommendations
PDF
DSS ITSEC CONFERENCE - Lumension Security - Intelligent application whiteli...
PDF
Apresentação Allen ES
Trend Micro - 13martie2012
Targeted Attacks: Have you found yours?
Trend Micro - Virtualization and Security Compliance
Arrow ECS IBM Partner Jam - Security Update - Vicki Cooper - IBM
Moving target-defense
Security model-of-sip-d2-05 at kishore
FROM STRATEGY TO ACTION - Vasil Tsvimitidze
Trend micro real time threat management press presentation
Digital Watermarking Applications and Techniques: A Brief Review
Ehc brochure
SCIT Labs - intrusion tolerant systems
SmartCard Forum 2009 - New trends in smart-cards technology
WP82 Physical Security in Mission Critical Facilities
Info security - mobile approach
DSS ITSEC Conference 2012 - SIEM Q1 Labs IBM Security Systems Intelligence
Digitalwatermarking
Retail Stores and Wireless Security—Recommendations
DSS ITSEC CONFERENCE - Lumension Security - Intelligent application whiteli...
Apresentação Allen ES
Ad

Viewers also liked (12)

PDF
Bridging the Social Media Implementation/Audit Gap
PPTX
Application Threat Modeling
PPT
STRIDE And DREAD
PDF
Domain-specific Modeling and Code Generation for Cross-platform Mobile and Io...
PPTX
7 Steps to Threat Modeling
PPTX
Threat modeling web application: a case study
PPTX
Securing Mobile Banking Apps - You Are Only as Strong as Your Weakest Link
PPT
Web Application Security
PDF
Attacking and Defending Mobile Applications
PPT
Application Threat Modeling
PDF
Real World Application Threat Modelling By Example
PPTX
Secure Design: Threat Modeling
Bridging the Social Media Implementation/Audit Gap
Application Threat Modeling
STRIDE And DREAD
Domain-specific Modeling and Code Generation for Cross-platform Mobile and Io...
7 Steps to Threat Modeling
Threat modeling web application: a case study
Securing Mobile Banking Apps - You Are Only as Strong as Your Weakest Link
Web Application Security
Attacking and Defending Mobile Applications
Application Threat Modeling
Real World Application Threat Modelling By Example
Secure Design: Threat Modeling
Ad

Similar to Threat Modeling / iPad (20)

PDF
Implementation of a Biometric Solution Providing Strong Authentication To Gai...
PPTX
A better waytosecureapps-finalv1
PDF
Drainware Corporate
PDF
Day 3 p2 - security
PDF
Day 3 p2 - security
PDF
IDBI Intech - Information security consulting
PPTX
Confoo 2012 - Web security keynote
PDF
Application Security
PPTX
Mobile Application Security
PPTX
Mobile application securitry risks ISACA Silicon Valley 2012
PPT
Cio ciso security_strategyv1.1
PDF
Unit 08: Security for Web Applications
PPTX
Information security
PDF
En arkitektonisk vy av en ledande och dynamisk IT-säkerhetsportfölj - PCTY 2011
PDF
Cloud Auditing
PDF
Isc2conferancepremay15final
PPTX
Dubai Cyber Security 01 Ics Scada Cyber Security Solutions and Challenges...
PPTX
HDFC_Grp4_iiimc
PPTX
Oracle security-formula
PPT
Guardium value proposition for fss pn 12 02-10
Implementation of a Biometric Solution Providing Strong Authentication To Gai...
A better waytosecureapps-finalv1
Drainware Corporate
Day 3 p2 - security
Day 3 p2 - security
IDBI Intech - Information security consulting
Confoo 2012 - Web security keynote
Application Security
Mobile Application Security
Mobile application securitry risks ISACA Silicon Valley 2012
Cio ciso security_strategyv1.1
Unit 08: Security for Web Applications
Information security
En arkitektonisk vy av en ledande och dynamisk IT-säkerhetsportfölj - PCTY 2011
Cloud Auditing
Isc2conferancepremay15final
Dubai Cyber Security 01 Ics Scada Cyber Security Solutions and Challenges...
HDFC_Grp4_iiimc
Oracle security-formula
Guardium value proposition for fss pn 12 02-10

More from Sylvain Maret (20)

PDF
Air Navigation Service Providers - Unsecurity on Voice over IP Radion
PDF
factsheet_4g_critical_comm_en_vl
PDF
INA Volume 1/3 Version 1.02 Released / Digital Identity and Authentication
PDF
INA Volume 1/3 Version 1.0 Released / Digital Identity and Authentication
PDF
INA Volume 1/3 Version 1.0 RC / Digital Identity and Authentication
PDF
Securite des Web Services (SOAP vs REST) / OWASP Geneva dec. 2012
PDF
Strong Authentication State of the Art 2012 / Sarajevo CSO
PDF
ASFWS 2012 / Initiation à la sécurité des Web Services par Sylvain Maret
PDF
Strong Authentication in Web Application #SCS III
PDF
Strong Authentication in Web Applications: State of the Art 2011
PDF
Strong Authentication in Web Application / ConFoo.ca 2011
PPT
Authentication and strong authentication for Web Application
PDF
Geneva Application Security Forum 2010
PDF
Final conclusions of Working Group 3 at Workshop Münchenwiler 20-21 of May 20...
PPTX
Comment protéger de façon efficace son/ses identité(s) numérique(s) sur le We...
PPTX
Digital identity trust & confidence
PDF
Geneva Application Security Forum: Vers une authentification plus forte dans ...
PDF
Geneva Application Security Forum: Vers une authentification plus forte dans ...
PDF
Geneva Application Security Forum: Vers une authentification plus forte dans ...
PPTX
Geneva Application Security Forum: Vers une authentification plus forte dans ...
Air Navigation Service Providers - Unsecurity on Voice over IP Radion
factsheet_4g_critical_comm_en_vl
INA Volume 1/3 Version 1.02 Released / Digital Identity and Authentication
INA Volume 1/3 Version 1.0 Released / Digital Identity and Authentication
INA Volume 1/3 Version 1.0 RC / Digital Identity and Authentication
Securite des Web Services (SOAP vs REST) / OWASP Geneva dec. 2012
Strong Authentication State of the Art 2012 / Sarajevo CSO
ASFWS 2012 / Initiation à la sécurité des Web Services par Sylvain Maret
Strong Authentication in Web Application #SCS III
Strong Authentication in Web Applications: State of the Art 2011
Strong Authentication in Web Application / ConFoo.ca 2011
Authentication and strong authentication for Web Application
Geneva Application Security Forum 2010
Final conclusions of Working Group 3 at Workshop Münchenwiler 20-21 of May 20...
Comment protéger de façon efficace son/ses identité(s) numérique(s) sur le We...
Digital identity trust & confidence
Geneva Application Security Forum: Vers une authentification plus forte dans ...
Geneva Application Security Forum: Vers une authentification plus forte dans ...
Geneva Application Security Forum: Vers une authentification plus forte dans ...
Geneva Application Security Forum: Vers une authentification plus forte dans ...

Recently uploaded (20)

PPTX
Understanding_Digital_Forensics_Presentation.pptx
PDF
cuic standard and advanced reporting.pdf
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PPTX
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PDF
Chapter 3 Spatial Domain Image Processing.pdf
PDF
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
PDF
KodekX | Application Modernization Development
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PPT
Teaching material agriculture food technology
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PDF
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
PDF
Spectral efficient network and resource selection model in 5G networks
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PDF
Review of recent advances in non-invasive hemoglobin estimation
PPTX
A Presentation on Artificial Intelligence
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PDF
CIFDAQ's Market Insight: SEC Turns Pro Crypto
Understanding_Digital_Forensics_Presentation.pptx
cuic standard and advanced reporting.pdf
Advanced methodologies resolving dimensionality complications for autism neur...
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
Building Integrated photovoltaic BIPV_UPV.pdf
Chapter 3 Spatial Domain Image Processing.pdf
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
KodekX | Application Modernization Development
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
Digital-Transformation-Roadmap-for-Companies.pptx
The Rise and Fall of 3GPP – Time for a Sabbatical?
Teaching material agriculture food technology
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
Spectral efficient network and resource selection model in 5G networks
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
Review of recent advances in non-invasive hemoglobin estimation
A Presentation on Artificial Intelligence
Per capita expenditure prediction using model stacking based on satellite ima...
CIFDAQ's Market Insight: SEC Turns Pro Crypto

Threat Modeling / iPad

  • 1. MARET Consulting | Boulevard Georges Favon 43 | CH 1204 Geneva | Tél +41 22 575 30 35 | info@maret-consulting.ch | www.maret-consulting.ch iPad net-Banking Project Technical Risk Assessment Sylvain Maret / Security Architect / 2012-05-24 @smaret Conseil en technologies
  • 2. Agenda  Context  Technical Risk Assessment approach  A six step process  Threat Model – DFD  STRIDE Model  Open discussion www.maret-consulting.ch Conseil en technologies
  • 3. Context www.maret-consulting.ch Conseil en technologies
  • 4. Context  Business case: enable customer access to portfolio performance reports from mobile equipments (iPad) located outside the controlled network. www.maret-consulting.ch Conseil en technologies
  • 5. Actors Security Product ACME Bank Web Agency www.maret-consulting.ch Conseil en technologies
  • 6. The TRA relies on a series of six activities: #1 • System characterization #2 • Threat identification #3 • Vulnerabilities identification #4 • Impacts analysis #5 • Risk characterization #6 • Risk treatment and mitigation www.maret-consulting.ch Conseil en technologies
  • 8. #1 - Appropriate safeguards  The selected solution shall implement the appropriate safeguards to maintain the overall security to its expected level. Required level C I A www.maret-consulting.ch Conseil en technologies
  • 9. #1  Ensure service integrity:  Uncontrolled client systems mean unpredictable request behavior  Prevent access from:  Offensive / hostile / corrupt requests www.maret-consulting.ch Conseil en technologies
  • 10. #1  Ensure information confidentiality:  While data travels across uncontrolled networks  While the client application is “offline” (turned-off)  While the client application is “online” (running)  Prevent access from:  Network capture:  Sniffers, gateways, cache proxies, MitM, etc.  Local capture:  Unsecure backups, memory-card access  Data interception by locally installed malware Conseil en technologies www.maret-consulting.ch
  • 11. #1  Consider project specific risks:  Outsourced vs. in-house development   where will security assurance come from?  Multi-disciplinary project involving three major actors:  The Bank (Acme - IT projects)  The portfolio performance reporting application (Web Agency)  The sandboxing application (Sysmosoft)  Who will be responsible for key security aspects? www.maret-consulting.ch Conseil en technologies
  • 12. Step #2 Threat identification www.maret-consulting.ch Conseil en technologies
  • 13. #2  Building a threat model  Decompose the Application  Diagramming - Data Flow Diagram - DFD  Determine and Rank Threats  STRIDE model www.maret-consulting.ch Conseil en technologies
  • 14. #2 - Data Flow Diagram (DFD) Process External entity Multiple Process Data store Data flow Trust Boundary www.maret-consulting.ch Conseil en technologies
  • 15. #2 - DFD - iPad net-Banking www.maret-consulting.ch Conseil en technologies
  • 16. #2 – STRIDE Model Threat Categories www.maret-consulting.ch Conseil en technologies
  • 17. #2 - Threat Agents www.maret-consulting.ch Conseil en technologies
  • 18. #2 - Threats - iPad net-Banking - Example www.maret-consulting.ch Conseil en technologies
  • 19. #2 - Different threats affect each type of element DFD Threat Comment S T R I D E ID ID Unsecure backups 2 Memory-card access T1 (iPad) Data interception by locally installed malware 3 Sniffers, gateways, cache (Transport- T2 proxies, MitM, etc. Internet) 7 Offensive / hostile / corrupt T3 (Banking- App) requests www.maret-consulting.ch Conseil en technologies
  • 21. #3 - Security controls - Example Threat Family Controls ID T1 Feature: local mobile application Secure offline data storage sandboxing Secure online data storage (in- memory storage) Secure environment validation (OS + client application integrity) Safeguards against malware T2 Feature: data transport security Confidential transport T3 Feature: secure architecture - defense in depth - privilege separation - trusted links & endpoint T3 Process: secure software Presence of software security development assurance controls in each development lifecycle: - Outsourced Dev www.maret-consulting.ch - Acme Bank Conseil en technologies
  • 22. #3 - Vulnerabilities identification Threat Controls V-ID Vulnerabilities ID T1 Secure offline data storage V100 ?? Secure online data storage (in-memory storage) Secure environment validation (OS + client application integrity) Safeguards against malware T2 Confidential transport V200 No Application Level Data Security T3 - defense in depth V300 No Hardening Strategy - privilege separation at Service Layer - trusted links & endpoint T3 Presence of software security assurance V400 Poor SDLC activities controls in each development lifecycle: - Outsourced Dev - Acme Bank www.maret-consulting.ch Conseil en technologies
  • 23. #3 - V100 - unknown Data Sharing between apps ? Device Jailbreaking ? Malicious legal App. ? www.maret-consulting.ch Conseil en technologies
  • 24. #3 - V200 - No Application Level Data Security Banking App www.maret-consulting.ch Conseil en technologies
  • 25. #3 - V300 - No Hardening Strategy at Service Layer No XML Firewall No Mutual Trust SSL at WS Transport Level No Hardening at OS & Service Level www.maret-consulting.ch Conseil en technologies
  • 26. #3 - V400 - Poor SDLC activities SDL de Microsoft www.maret-consulting.ch Conseil en technologies
  • 27. #3 - Security Assurance during development Project phase Assurance Security level activities -Security requirements Analysis - Compliance reqs., policy - Secure design / Design security review - Threat model Design - Security testing plan - Safe APIs Implementation - Secure coding / defensive programming ? - Automated source code analysis - Security testing Verification - Penetration testing - Secure default configuration Delivery - Hardening / secure deployment guides - Configuration validation - Incident response process Operations - Threat / vulnerability management www.maret-consulting.ch Conseil en technologies
  • 28. #3 – Web Agency: software development security assurance Project phase Assurance Security level activities Analysis - involvement of a security architect during the design process Design - use of automated code quality analysis Implementation tools Verification Delivery - experience with customers conducting Operations regular security evaluations www.maret-consulting.ch Conseil en technologies
  • 29. #3 - Acme Bank: software development security assurance Assurance Project phase Security level activities Analysis Design Implementation ? Verification Delivery Operations www.maret-consulting.ch Conseil en technologies
  • 30. #3 - Software development security assurance: Summary Actor Assurance Conclusions level - Assurance level is low. Acme Bank shall agree with Outsourced Dev vendor on minimum security assurance requirements along the project, or establish a clear statement of responsibilities (SLA). - Assurance level is low. Acme Bank shall define minimum Acme Bank ? security assurance requirements with project management. www.maret-consulting.ch Conseil en technologies
  • 31. Step #4 Impact analysis www.maret-consulting.ch Conseil en technologies
  • 32. #4 – Impact analysis – Example V-ID Description Severity Exposure V-100 Information disclosure on iPad HIGH Additional controls needed V-200 Information disclosure on data MEDIUM Additional controls transport needed V-300 Intrusion on Banking Application HIGH Additional controls needed V-400 Intrusion on Banking Application HIGH Additional controls needed www.maret-consulting.ch Conseil en technologies
  • 33. Step #5 Risk estimation www.maret-consulting.ch Conseil en technologies
  • 34. #5 – Risk estimation - Example Tech. Business R-ID V-ID Description Likelihood Severity Impact Impact R-1 V-200 Confidentiality Compliance Theft of credentials MEDIUM HIGH Reputation or personal data during transport R-2 V-300 Integrity Compliance User input LOW HIGH V-400 Reputation, tampering attempts Operations resulting in system compromise R-3 -- -- -- -- -- -- R-4 -- -- -- -- -- -- R-5 R-6 www.maret-consulting.ch Conseil en technologies
  • 35. Step #6 Risk treatment and mitigation www.maret-consulting.ch Conseil en technologies
  • 36. #6 – Security controls - Example Reco. ID Risk Description Decision MC SC.1 R-1 Perform a pentest on the iPad Mitigate application SC.2 R-1 Implement Data encryption for transport Mitigate SC.3 R-2 Deploy a XML Firewall in front of Web Mitigate Service SC.4 R-2 Perform code review Mitigate Perform Pentest www.maret-consulting.ch Conseil en technologies
  • 37. Conclusion  Security in mind during the project  Iterative process  Risk Assessment during the project  Risk Assessment after deployment  Threat Modeling  A new approach  A guideline for all project www.maret-consulting.ch Conseil en technologies
  • 38. Questions ? www.maret-consulting.ch Conseil en technologies
  • 39. Who am I?  Security Expert  17 years of experience in ICT Security  Principal Consultant at MARET Consulting  Expert at Engineer School of Yverdon & Geneva University  Swiss French Area delegate at OpenID Switzerland  Co-founder Geneva Application Security Forum  OWASP Member  Author of the blog: la Citadelle Electronique  http://ch.linkedin.com/in/smaret or @smaret  http://www.slideshare.net/smaret  Chosen field  AppSec & Digital Identity Security www.maret-consulting.ch Conseil en technologies
  • 40. References  https://www.owasp.org/index.php/Application_Threat_ Modeling  http://msdn.microsoft.com/en-us/library/ff648644.aspx  http://en.wikipedia.org/wiki/Threat_model  http://www.microsoft.com/security/sdl/default.aspx  http://www.appsec-forum.ch/ www.maret-consulting.ch Conseil en technologies
  • 41. "Le conseil et l'expertise pour le choix et la mise en oeuvre des technologies innovantes dans la sécurité des systèmes d'information et de l'identité numérique" www.maret-consulting.ch Conseil en technologies
  • 42. Backup Slides www.maret-consulting.ch Conseil en technologies
  • 43. #2 - Understanding the threats Threat Property Definition Example Spoofing Authentication Impersonating Pretending to be any of billg, xbox.com or something or a system update someone else. Tampering Integrity Modifying data or Modifying a game config file on disk, or a code packet as it traverses the network Repudiation Non-repudiation Claiming to have not “I didn’t cheat!” performed an action Information Confidentiality Exposing Reading key material from an app Disclosure information to someone not authorized to see it Denial of Service Availability Deny or degrade Crashing the web site, sending a packet service to users and absorbing seconds of CPU time, or routing packets into a black hole Elevation of Authorization Gain capabilities Allowing a remote internet user to run Privilege without proper commands is the classic example, but authorization running kernel code from lower trust levels www.maret-consulting.ch is also EoP Conseil en technologies Source: Microsoft SDL Threat Modeling
  • 44. #3 - V400 - Poor SDLC activities Software assurance maturity models: SAMM (OWASP) www.maret-consulting.ch Conseil en technologies
  • 45. #2 – Data Flow Diagram External Data Process Data Store entity Flow • People • DLLs • Function call • Database • Other systems • EXEs • Network traffic • File • Microsoft.com • Components • Etc… • Registry • etc… • Services • Shared • Web Services Memory • Assemblies • Queue/Stack • etc… • etc… Trust Boundary • Process boundary • File system www.maret-consulting.ch Conseil en technologies