Brain Dump

Threat Modelling

Tags
security

The [see page 49, first] step in secure software design (part of SDLC), where potential threats are identified and prioritised.

[see page 49, Involves]:

  • Identifying assets and stakeholders.
  • Consider architecture of application and environment.
  • Brainstorm about known threats.
  • Define security assumptions.
  • Rank threats by risk (roughly \( \text{impact} \times \text{likelihood} \)).

Goals and considerations:

  • Think about security issues early.
  • Understand your requirements better.
  • Decide which threats to respond to.
  • Decide how to mitigate these threats.
  • Where are the high-value assets?
  • Where am I most vulnerable to attack?
  • What are the most relevant threats?

Warn: [see page 52, Never] think good prevention makes detection & reaction unessential.

A core aspect of threat modelling is threat identifications which can be done using: