Threat modeling introduction
- Threat modeling in a secure development lifecycle
- What is threat modeling?
- Why perform threat modeling?
- Threat modeling stages
- Different threat modeling methodologies
- Document a threat model
Diagrams – what are you building?
- Understanding context
- Doomsday scenarios
- Data flow diagrams
- Trust boundaries
- Sequence and state diagrams
- Advanced diagrams
- Hands-on: diagramming web and mobile applications, sharing the same REST backend
Identifying threats – what can go wrong?
- STRIDE introduction
- Spoofing threats
- Tampering threats
- Repudiation threats
- Information disclosure threats
- Denial of service threats
- Elevation of privilege threats
- Attack trees
- Attack libraries
- Hands-on: STRIDE analysis of an Internet of Things (IoT) gateway and cloud update service
Addressing each threat
- Mitigation patterns
- Authentication: mitigating spoofing
- Integrity: mitigating tampering
- Non-repudiation: mitigating repudiation
- Confidentiality: mitigating information disclosure
- Availability: mitigating denial of service
- Authorization: mitigating elevation of privilege
- Specialist mitigations
- Hands-on: AWS threat mitigations for a travel booking system build on microservices
Threat modeling and compliance
- How to marry threat modeling with compliance
- GDPR and Privacy by design
- Privacy threats
- LINDUNN and Mitigating privacy threats
- Threat modeling medical devices (FDA pre- and post-market guidance)
- Threat modeling Industrial Control Systems (IEC 62443)
- Threat Assessment and Remediation Analysis for automotive (TARA, SAE 21434)
- Mapping threat modeling on compliance frameworks
- Hands-on: privacy threat modeling of a face recognition system in an airport
Penetration testing based on offensive threat models
- Create pentest cases for threat mitigation features
- Pentest planning to exploit security design flaws
- Vulnerabilities as input to plan and scope security testing
- Prioritization of pentesting based on risk rating
- Hands-on: get into the defender's head – modeling points of attack of a nuclear facility.
Advanced threat modeling
- Typical steps and variations
- Validation threat models
- Effective threat model workshops
- Communicating threat models
- Agile and DevOps threat modeling
- Improving your practice with the Threat Modeling Playbook
- Scaling up threat modeling
- Threat modeling and compliance: ISO14971 (medical devices), IEC 62443 (industrial cybersecurity), SAE 21434 (automotive)
- Threat models examples: medical devices, automotive, industrial control systems, IoT and Cloud
Threat modeling resources
- Open-Source tools
- Commercial tools
- General tools
- Threat modeling tools compared
- Battle for control over 'Zwarte Wind', an offshore wind turbine park
Examination
- Hands-on examination
- Grading and certification
Student package
Your bonus training package includes:
- Following a successful exam (passing grade defined at 70%): Threat Modeling Practitioner certificate
- One year of access to our threat modeling e-learning platform
- Presentation handouts
- Tailored use case worksheets
- Detailed use case solution descriptions
- Threat model documentation template
- Template for calculating identified threat risk severity
- Threat modeling playbook
- STRIDE mapped on compliance standards