Threat Modeling in Layers
James Rabe
Head of Global Services | CISSP | Threat Modeling | Bridging Innovation and Execution
Much like great dips, threat models come in layers and are best when shared with friends.
Threat modeling has been enabled by many different frameworks which generally include the process of scoping, assessment of threats (in some structured process), review of controls, and assessment of effectiveness. A good example of this is Shostack's Four Question Frame for Threat Modeling. This method, in my opinion is the most concise method to instruct new practitioners in the art of modeling threats. Recapping those four questions for those unfamiliar with this science provides the following:
Questions to guide us during threat modeling -
These questions are versatile and can be adapted to almost any situation. This adaptability makes them broadly relevant and engaging, as they align with our natural instincts and inquiries. Who hasn't seen the aggresive neighboorhood dog and considered the possible scenarios? Who hasn't been hiking in the woods and confidentially determined that they don't have to be the fastest runner, they just can't be the slowest in the event of a bear attack?
Frameworks like this are a valuable high level process for guideing threat modeling but could use some supplementation in areas like system representation.
ENTER THE THREE LAYER THREAT MODEL!!!
Layer 1 - Environment
Answers the question - What environment is this applicaiton or service hosted in?
领英推荐
Layer 2 - Infrastructure
Answers the question - What type of infrastructure is used within this environment?
Layer 3 - Functional
Answers the question - What function does this system provide?
Conclusion
This approach will not solve or meet the needs of all organizations but it does help in reducing the complexity or activation energy needed to kick-off an effective system representation during threat modeling.
For more information about 3 Layer Threat Models, check out this GitHub repo - https://github.com/Jayarr03/3_Layer_Threat_Model