Threat model has three distinct
- Description of the security issues designer cares about.
- Description of a set of security aspects.
- Determining threats
Before you start the threat modeling you should understand the following basic terminology
- Asset : A resource of value such as a data in the data base or a file system .
- Threat: A potential occurrence
- Vulnerability : A weakness in some aspect ,vulnerability may exist at the network ,host, application levels
- Attack: An Action taken by some one following through the threat or vulnerability.
- Countermeasure : A safeguard that addresses a threat and mitigates the risk.
Threat Modelling Process:
- Identify the assets : Identify the valuable assets that your system can protect.
- Create an Architecture Overview: Use simple diagrams and tables to document the architecture of the application.
- Decompose the Application: Decompose the architecture of the application including the underlying network and host infrastructure.
- Identify the threats: Identify the threat that could affect the application.
- Document the threats: Document the threats using common threat template.
- Rate the threats : Rate the threats and prioritize the most significant threat first.
Threat model has become an integral part of Microsoft's SDL (Security Development Life Cycle). For more details about threat modeling please visit :
http://msdn.microsoft.com/en-us/security/aa570411.aspx.
Threat Modeling Tool :
The threat modeling tool allows the user to create a threat model documents for application.
For more details for download please visit:
No comments:
Post a Comment