Threat Modelling Data SchemaView the original Working Session content
Description of session
The purpose of this session was to discuss requirements around a data schema for threat modelling to enable and/or support repeatable and automated threat modelling.
The conversation started with a walkthrough of the way Photobox are using vulnerability and risk data within JIRA to create graphs. This was done to show the potential of being able to harness usable threat data within a database to automatically create visual representations of the threat landscape for an IT asset.
The following are notes from the session - at this stage nothing was decided, rather a set of requirements were gathered to help aid and direct future conversations/ work in this space:
- Tightly integrated with MITRE’s ATT&CK, so everyone is “talking the same language”
- Embrace DevSecOps methodology; this idea needs to be implemented and then modified appropriately, rather than expecting to get the solution the 1st time
- Must support TM at all stages of the SDLC
- Must be able to show the impact of a proposed update to a service (branch TM’s)
- Support versioning
- Automatically generate threats based on certain captured characteristics (e.g. internet facing, technology XYZ)
- Automatically generate graphs/ diagrams based on added content and data links
- Be able to model dataflow, process, external entity, data storage, trust boundaries
- Automatically generate STRIDE tables for trust boundaries
- Identify sensitive/confidential data
- Support custom data sensitivity/ confidentiality levels
- Identify PII data on the model
Synopsis and Takeaways
- Wider session requested on data schemas / automated threat modelling and tech stacks - working session to be added to Summit schedule.
- Where automation is utilised, how do we ensure we don’t remove engineers’ abilities to learn from the threat modelling process, contribute and collaborate with security teams.
- By removing the manual process are we potentially missing threats captured from engineers’ contributions?
- How much data should be captured in a threat model? When is there too much data?
- What data shouldn’t be in a threat model (assuming it’s captured elsewhere?)
- Should CVEs be present?
- Should SAST/ pen test output be present?
- Presentation from Toreon team requested on the work they’re doing in this space (none of the project team were able to make the session)
- https://www.slideshare.net/DinisCruz/creating-a-graph-based-security-organisation-apr-2019-owasp-london-chapter-meeting. These slides were not used in the session but they provide useful context
- Sample draft data schema from Tash Norris: https://twitter.com/TashJNorris/status/1120057714971947008