07 Processing and Managing Threats Flashcards

1
Q

When should you threat model in a project, and why?

A

Threat modeling should be started at the beginning of the project.

The act of drawing trust boundaries early on can greatly help you improve your architecture.

You should also threat model as you work through features. This allows you to have smaller, more focused threat modeling projects, keeping your skills sharp and reducing the change that you’ll find big problems at the end.

It is also a good idea to revisit the threat model as you get ready to deliver, to ensure that you haven’t made decisions which accidentally altered the reality underlying the model.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are second or third order threats?

A

Second or third order threats are the threats in which an attacker will try to bypass the features or design elements that you put in place to block the most important threat.

For example, if the primary threat is a car thief breaking a window, a secondary threat is them jumping the ignition.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are the two value propositions of threat modeling as you work through features?

A

The first is that if you do small threat model as you start a component feature, the design is probably closer to mind. In other words, you’ll have a more detailed model with which to look for threats.

The second is that if you find threats, they are closer to mind as you’re working on that feature.

Threat modeling as you work through features can also help you maintain your awareness of threats and your skills at threat modeling.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What does reexamining the model means in the “Close to Delivery” stage?

A

Reexamining the model means ensuring that everyone still agrees it’s a decent model of what you’re building, and that it includes all the trust boundaries and data flows that cross them.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

When you start looking for threats, what is the most essential input?

A

When you start looking for threats, a diagram is something between useful and essential input.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are the two testable states to help assess you are done?

A

The first is that you have filed bugs, and second is that you have a diagram or diagrams that everyone agrees represents the system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is top down threat modeling?

A

Top down threat modeling is an approach to finding threats by modeling from the highest-level view you can build the entire system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is bottom-up threat modeling?

A

Bottom-up threat modeling is an approach to finding threats by starting to work from features, and then attempts to derive a coherent model from those feature-level model.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Why bottom-up threat modeling does not work?

A

The reason bottom-up threat modeling does not work is because it is challenging to bring threat models together when they are not derived from a system-level view.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are three different lists you iterate “across”?

A

The three different lists you iterate across are:
1. Iterate across a list of the trust boundaries
2. Iterate across a list of diagram elements
3. Iterate across a list of threats

How well did you know this?
1
Not at all
2
3
4
5
Perfectly