Risk Assessment
##
Threat modeling
- What is the product/project?
- What could the attacker hit?
- What are the available solution(s)?
- Review the STRIDE matrix
Why do we perform threat modeling? Because it should help you design defenses that make sense for the product and meet regulatory needs
Ultimately, resources (time, analysts, etc.) are limited and threat modeling helps prioritize resources
So, an example for this would be if you run a small local restaurant, then you could put “nation-state” as part of your possible threat on the list
But a nation-state is unlikely to target a small restaurant
So you don’t allocate any resource to defending against that kind of threat
STRIDE
Threat | Desired property |
---|---|
Spoofing | Authenticity |
Tampering | Integrity |
Repudiation | Non-repudiability |
Information disclosure | Confidentiality |
Denial of service | Availability |
Elevation of privilege | Authorization |
A very big part of threat modeling is “intended effect” and “unintended effect”
So this can be applied to anything
##
cybersecurity
]