- Learn Kubernetes Security
- Kaizhe Huang Pranjal Jumde Loris Degioanni
- 460字
- 2021-06-18 18:32:35
Introduction to threat modeling
Threat modeling is a process of analyzing the system as a whole during the design phase of the software development life cycle (SDLC) to identify risks to the system proactively. Threat modeling is used to think about security requirements early in the development cycle to reduce the severity of risks from the start. Threat modeling involves identifying threats, understanding the effects of each threat, and finally developing a mitigation strategy for every threat. Threat modeling aims to highlight the risks in an ecosystem as a simple matrix with the likelihood and impact of the risk and a corresponding risk mitigation strategy if it exists.
After a successful threat modeling session, you're able to define the following:
- Asset: A property of an ecosystem that you need to protect.
- Security control: A property of a system that protects the asset against identified risks. These are either safeguards or countermeasures against the risk to the asset.
- Threat actor: A threat actor is an entity or organization including script kiddies, nation-state attackers, and hacktivists who exploit risks.
- Attack surface: The part of the system that the threat actor is interacting with. It includes the entry point of the threat actor into the system.
- Threat: The risk to the asset.
- Mitigation: Mitigation defines how to reduce the likelihood and impact of a threat to an asset.
The industry usually follows one of the following approaches to threat modeling:
- STRIDE: The STRIDE model was published by Microsoft in 1999. It is an acronym for Spoofing, Tampering, Repudiation, Information Disclosure, Denial of Service, and Escalation of Privilege. STRIDE models threats to a system to answer the question, 'What can go wrong with the system?'
- PASTA: Process for Attack Simulation and Threat Analysis is a risk-centric approach to threat modeling. PASTA follows an attacker-centric approach, which is used by the business and technical teams to develop asset-centric mitigation strategies.
- VAST: Visual, Agile, and Simple Threat modeling aims to integrate threat modeling across application and infrastructure development with SDLC and agile software development. It provides a visualization scheme that provides actionable outputs to all stakeholders such as developers, architects, security researchers, and business executives.
There are other approaches to threat modeling, but the preceding three are the most used within the industry.
Threat modeling can be an infinitely long task if the scope for the threat model is not well defined. Before starting to identify threats in an ecosystem, it is important that the architecture and workings of each component, and the interactions between components, are clearly understood.
In previous chapters, we have already looked in detail at the basic functionality of every Kubernetes component. Now, we will look at the interactions between different components in Kubernetes before investigating the threats within the Kubernetes ecosystem.
- 新中國審計制度變遷
- 中國特色社會主義國家審計制度研究
- Business Intelligence with MicroStrategy Cookbook
- 項目管理(第二版)
- 大數據搜索與挖掘及可視化管理方案 :Elastic Stack 5:Elasticsearch、Logstash、Kibana、X-Pack、Beats (第3版)
- Tableau:Creating Interactive Data Visualizations
- 陜西國家統計調查市、縣優秀報告集萃(2006—2015)(上下)
- 中國審計市場:制度變遷與競爭行為
- 政策建模技術:CGE模型的理論與實現
- Oracle E-Business Suite Financials R12:A Functionality Guide
- 計量經濟學理論與應用:基于Eviews的應用分析
- Building Dashboards with Microsoft Dynamics GP 2016(Second Edition)
- 統計學理論前沿(谷臻小簡·AI導讀版)
- INSTANT IBM Lotus Notes 8.5.3 How-to
- 審計學