You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: data-new/CultureAndOrganization/Design.yaml
+81-11Lines changed: 81 additions & 11 deletions
Original file line number
Diff line number
Diff line change
@@ -1,4 +1,30 @@
1
1
Design:
2
+
Creation of threat modeling processes and standards:
3
+
risk:
4
+
- Inadequate identification of business and technical risks.
5
+
measure: Creation of threat modeling processes and standards through the organization helps to enhance the security culture and provide more structure to the threat modelings.
Threat modeling is a structured activity for identifying, evaluating, and managing system threats, architectural design flaws, and recommended security mitigations. It is typically done as part of the design phase or as part of a security assessment.
69
130
70
-
Once requirements are gathered and analysis is performed, implementation specifics need to be defined. The outcome of this stage is usually a diagram outlining data flows and a general system architecture. This presents an opportunity for both threat modeling and attaching security considerations to every ticket and epic that is the outcome of this stage.
131
+
Threat modeling is a team exercise, including product owners, architects, security champions, and security testers. At this maturity level, expose teams and stakeholders to threat modeling to increase security awareness and to create a shared vision on the security of the system.
71
132
133
+
At maturity level 1, you perform threat modeling ad-hoc for high-risk applications and use simple threat checklists, such as STRIDE. Avoid lengthy workshops and overly detailed lists of low-relevant threats. Perform threat modeling iteratively to align to more iterative development paradigms. If you add new functionality to an existing application, look only into the newly added functions instead of trying to cover the entire scope. A good starting point is the existing diagrams that you annotate during discussion workshops. Always make sure to persist the outcome of a threat modeling discussion for later use.
134
+
135
+
Your most important tool to start threat modeling is a whiteboard, smartboard, or a piece of paper. Aim for security awareness, a simple process, and actionable outcomes that you agree upon with your team. Once requirements are gathered and analysis is performed, implementation specifics need to be defined. The outcome of this stage is usually a diagram outlining data flows and a general system architecture. This presents an opportunity for both threat modeling and attaching security considerations to every ticket and epic that is the outcome of this stage.
There is some great advice on threat modeling out there *e.g.* [this](https://arstechnica.com/information-technology/2017/07/how-i-learned-to-stop-worrying-mostly-and-love-my-threat-model/) article or [this](https://www.microsoft.com/en-us/securityengineering/sdl/threatmodeling) one.
73
140
74
141
A bite sized primer by Adam Shostack himself can be found [here](https://adam.shostack.org/blog/2018/03/threat-modeling-panel-at-appsec-cali-2018/).
@@ -100,7 +167,7 @@ Design:
100
167
GraphQL queries are dynamically translated to SQL, Elasticsearch and NoSQL queries. Access to data is protected with basic auth set to _1234:1234_ for development purposes.
101
168
102
169
Source: OWASP Project Integration Project
103
-
samm: TA1-A
170
+
samm2: threat-assessment|B|2
104
171
iso27001-2017:
105
172
- not explicitly covered by ISO 27001
106
173
- may be part of risk assessment
@@ -120,7 +187,7 @@ Design:
120
187
level: 4
121
188
dependsOn:
122
189
- Creation of simple abuse stories
123
-
samm: TA2-A
190
+
samm2: threat-assessment|B|2
124
191
iso27001-2017:
125
192
- not explicitly covered by ISO 27001
126
193
- may be part of project management
@@ -144,8 +211,8 @@ Design:
144
211
time: 2
145
212
resources: 1
146
213
usefulness: 4
147
-
level: 2
148
-
samm: TA2-A
214
+
level: 3
215
+
samm2: threat-assessment|B|2
149
216
iso27001-2017:
150
217
- not explicitly covered by ISO 27001
151
218
- may be part of project management
@@ -159,6 +226,9 @@ Design:
159
226
description: "[Don't Forget EVIL User Stories](https://www.owasp.org/index.php/Agile_Software_Development:_Don%27t_Forget_EVIL_User_Stories)\
160
227
\ and [Practical Security Stories and Security Tasks for Agile Development\
0 commit comments