XConf Unplugged: Secure Design with Threat Modelling
ThoughtWorks
1,800 views
35 slides
Nov 30, 2018
Slide 1 of 35
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
About This Presentation
XConf Unplugged is a meet up series for technologists to stay up to date with the latest tech trends and news. This event is the fourth in our series and is focused on security in software development.
No-one needs convincing that they need to write secure software and deal with their users' ...
XConf Unplugged is a meet up series for technologists to stay up to date with the latest tech trends and news. This event is the fourth in our series and is focused on security in software development.
No-one needs convincing that they need to write secure software and deal with their users' data responsibly anymore. But there's a steep learning curve on the topic of security, as the number (and profile) of threats seems to just keep climbing – everything from organised crime and government spying to teenagers who attack systems "for the lulz" – it can all be pretty overwhelming. Threat Modelling and the use of STRIDE as a model provides a set of techniques that help you identify and address the most important threats in both design and in delivery. While only part of a strategy to stay ahead, when used in conjunction with other techniques in your secure software delivery lifecycle, Threat Modelling with STRIDE can help to keep your system secure.
This presentation was made by Jim Gumbley, Technical Principal at ThoughtWorks and Fraser Scott, Cyber Threat Modelling Engineer at Capital One.
Size: 7.56 MB
Language: en
Added: Nov 30, 2018
Slides: 35 pages
Slide Content
Jim Gumbley - ThoughtWorks
Fraser Scott - Capital One
Thinking about things that can go wrong...
…so you can do something about them...
...before they go wrong.
●
●
●
●
●
●
●
●
The are determined by
you threat model, is
involved, and you do it
DESIGN
BUILD
DEPLOY
MAINTAIN
●Three Amigos
●Whole Team
●Multi-Team
●What are we building?
●What can go wrong?
●What are we going to do about it?
●Did we do a good enough job?
●Identity
●Authentication
●Integrity
●Injection
●Validation
●Non-Repudiation
●Logging
●Audit
●Confidentiality
●Encryption
●Leakage
●Man in the middle
It would be very remarkable if any system
existing in the real world could be exactly
represented by any simple model. The only
question of interest is: "Is the model
illuminating and useful?"
Juice Shop
Juice Shop
DEMO
Welcome to the
Juice Shop!
Juice Shop
●
●
●
●
1.REVIEW THE JUICE SHOP SECURITY DEBT
2.THREAT MODEL THE DISCOUNT USER STORY
Amazon Web Services
Container Runtime
Docker / AWS ECS
SQL
AWS RDS PostgresJuice Shop
Server NodeJS
Juice
Buyer
Shop
Admin
Files
AWS EBS
Engineers
Logs
ELK Stack
Juice Shop
Frontend
AngularJS
Bootstrap CSS
Google
Oauth
Travis
CI
Github
Payment
Service NodeJS
Login
View Product
View Basket
Confirm
Order
Add item to basket
[item id]
Go to BasketReturn to products
Redirect
Checkout
Remove item
[item id]
Apply Discount
Unauthenticated
on Internet
Authenticated
Juice Buyer
[Discount Code]
Checkout