官术网_书友最值得收藏!

Introduction to threat modeling

Threat modeling is a process of analyzing the system as a whole during the design phase of the software development life cycle (SDLC) to identify risks to the system proactively. Threat modeling is used to think about security requirements early in the development cycle to reduce the severity of risks from the start. Threat modeling involves identifying threats, understanding the effects of each threat, and finally developing a mitigation strategy for every threat. Threat modeling aims to highlight the risks in an ecosystem as a simple matrix with the likelihood and impact of the risk and a corresponding risk mitigation strategy if it exists.

After a successful threat modeling session, you're able to define the following:

  1. Asset: A property of an ecosystem that you need to protect.
  2. Security control: A property of a system that protects the asset against identified risks. These are either safeguards or countermeasures against the risk to the asset.
  3. Threat actor: A threat actor is an entity or organization including script kiddies, nation-state attackers, and hacktivists who exploit risks.
  4. Attack surface: The part of the system that the threat actor is interacting with. It includes the entry point of the threat actor into the system.
  5. Threat: The risk to the asset.
  6. Mitigation: Mitigation defines how to reduce the likelihood and impact of a threat to an asset.

The industry usually follows one of the following approaches to threat modeling:

  • STRIDE: The STRIDE model was published by Microsoft in 1999. It is an acronym for Spoofing, Tampering, Repudiation, Information Disclosure, Denial of Service, and Escalation of Privilege. STRIDE models threats to a system to answer the question, 'What can go wrong with the system?'
  • PASTA: Process for Attack Simulation and Threat Analysis is a risk-centric approach to threat modeling. PASTA follows an attacker-centric approach, which is used by the business and technical teams to develop asset-centric mitigation strategies.
  • VAST: Visual, Agile, and Simple Threat modeling aims to integrate threat modeling across application and infrastructure development with SDLC and agile software development. It provides a visualization scheme that provides actionable outputs to all stakeholders such as developers, architects, security researchers, and business executives.

There are other approaches to threat modeling, but the preceding three are the most used within the industry.

Threat modeling can be an infinitely long task if the scope for the threat model is not well defined. Before starting to identify threats in an ecosystem, it is important that the architecture and workings of each component, and the interactions between components, are clearly understood.

In previous chapters, we have already looked in detail at the basic functionality of every Kubernetes component. Now, we will look at the interactions between different components in Kubernetes before investigating the threats within the Kubernetes ecosystem.

主站蜘蛛池模板: 华宁县| 界首市| 仁化县| 绥中县| 兴宁市| 台安县| 栾川县| 房产| 兰考县| 宜昌市| 剑河县| 乐平市| 元氏县| 开平市| 濉溪县| 双柏县| 苍南县| 苗栗县| 南昌市| 观塘区| 长子县| 舒城县| 永年县| 荥经县| 库伦旗| 米脂县| 金沙县| 霍林郭勒市| 安达市| 满洲里市| 巩留县| 西乡县| 南靖县| 元江| 茌平县| 辽宁省| 抚顺县| 高淳县| 巫溪县| 呼图壁县| 滦平县|