Upgrade to Pro
— share decks privately, control downloads, hide ads and more …
Speaker Deck
Features
Speaker Deck
PRO
Sign in
Sign up for free
Search
Search
Secure by design: introduction to threat modeling
Search
Sponsored
·
SiteGround - Reliable hosting with speed, security, and support you can count on.
→
Jérémy Courtial
June 20, 2018
Technology
0
53
Secure by design: introduction to threat modeling
An introduction to threat modeling and some ideas on how to integrate it in yours teams.
Jérémy Courtial
June 20, 2018
Tweet
Share
More Decks by Jérémy Courtial
See All by Jérémy Courtial
sudo give the cloud
mrartichaut
0
27
An introduction to AppSec?
mrartichaut
0
47
Taming secrets with Vault
mrartichaut
0
87
Lead Tech: Empowering the team
mrartichaut
0
48
Web Platform Security
mrartichaut
0
48
go doSomeThing()
mrartichaut
0
53
Practical Cryptography : Data Encryption
mrartichaut
0
62
Practical Cryptography : Password Hashing
mrartichaut
1
74
HTTP/2 : One connection to rule them all
mrartichaut
1
62
Other Decks in Technology
See All in Technology
CDKで始めるTypeScript開発のススメ
tsukuboshi
1
520
プロポーザルに込める段取り八分
shoheimitani
1
610
ファインディの横断SREがTakumi byGMOと取り組む、セキュリティと開発スピードの両立
rvirus0817
1
1.6k
Cosmos World Foundation Model Platform for Physical AI
takmin
0
960
SREじゃなかった僕らがenablingを通じて「SRE実践者」になるまでのリアル / SRE Kaigi 2026
aeonpeople
6
2.5k
CDK対応したAWS DevOps Agentを試そう_20260201
masakiokuda
1
380
登壇駆動学習のすすめ — CfPのネタの見つけ方と書くときに意識していること
bicstone
3
130
2026年、サーバーレスの現在地 -「制約と戦う技術」から「当たり前の実行基盤」へ- /serverless2026
slsops
2
260
フルカイテン株式会社 エンジニア向け採用資料
fullkaiten
0
10k
Ruby版 JSXのRuxが気になる
sansantech
PRO
0
160
1,000 にも届く AWS Organizations 組織のポリシー運用をちゃんとしたい、という話
kazzpapa3
0
100
茨城の思い出を振り返る ~CDKのセキュリティを添えて~ / 20260201 Mitsutoshi Matsuo
shift_evolve
PRO
1
370
Featured
See All Featured
For a Future-Friendly Web
brad_frost
182
10k
AI: The stuff that nobody shows you
jnunemaker
PRO
2
270
The untapped power of vector embeddings
frankvandijk
1
1.6k
DevOps and Value Stream Thinking: Enabling flow, efficiency and business value
helenjbeal
1
100
Principles of Awesome APIs and How to Build Them.
keavy
128
17k
Paper Plane (Part 1)
katiecoart
PRO
0
4.3k
The Curious Case for Waylosing
cassininazir
0
240
brightonSEO & MeasureFest 2025 - Christian Goodrich - Winning strategies for Black Friday CRO & PPC
cargoodrich
3
100
Code Review Best Practice
trishagee
74
20k
BBQ
matthewcrist
89
10k
Building Better People: How to give real-time feedback that sticks.
wjessup
370
20k
Rails Girls Zürich Keynote
gr2m
96
14k
Transcript
Secure by design Threat modeling Jérémy Courtial - Software Security
Architect
How to ship secure applications?
Vulnerability: a very nasty kind of bug Oxford dictionary
Good news! We know how to handle bugs!
Design Test Implement Deploy
Design Test Implement Deploy Threat modeling
Design Test Implement Deploy Secure coding Trusted libraries Code reviews
Design Test Implement Deploy Fuzzing Pen tests
Design Test Implement Deploy Secure environment Monitoring Incident responses
Threat modeling?
What you all want… $ ./threat_model app.jar Analyzing… Done. You’re
fine! Good job!
Sorry
Threat modeling: A process to identify and prioritize structural threats
in applications
How to? - decompose your app - find threats -
decide what to do
1. What are you building?
List entities, processes, data stores and data flows
Architecture and communication diagrams are good starting points
Otherwise, use a whiteboard!
Client App Web Server Database Offsite Storage
Client App Web Server Business Schema Offsite Storage Metrics Schema
Client App Web Server Database Offsite Storage Request file Read
file metadata Read file Download file
Client client hello TLS versions, cipher suites, … server hello
Selected version/cipher, certificate, … client key exchange encrypted pre-master key Verify certificate, parameters Decrypt using private key Server Encrypt using public key
Now the most important part: add trust boundaries
Trust boundaries make explicit different levels of privilege
Client App Web Server Database Offsite Storage Production datacenter Cloud
provider
Trust boundaries help you focus your efforts where they matter
2. Find threats
Threats tend to appear around trust boundaries.
But how to find them?
R S E D I T Useful mnemonic/framework:
R S E D I T
R S E D I T poofing
R S E D I T poofing ampering
R S E D I T poofing ampering epudiation
R S E D I T poofing epudiation nformation disclosure
ampering
R S E D I T poofing epudiation nformation disclosure
enial of service ampering
R S E D I T poofing epudiation nformation disclosure
enial of service levation of privilege ampering
Publisher Broker Subscriber
Publisher Broker Subscriber What? Tampering Information disclosure How? Man-in-the-middle
Publisher Broker Subscriber What? Spoofing How? Man-in-the-middle Malicious Broker
Publisher Broker Subscriber What? Spoofing How? Unauthorized publisher
Publisher Broker Subscriber What? Spoofing How? Unauthorized subscriber
Publisher Broker Subscriber What? Information disclosure How? Unauthorized subscriber Unsecure
persistence mechanism
Publisher Broker Subscriber What? Tampering How? Unsecure persistence mechanism
3. Decide what to do
None
Nope (except if you’re the NSA)
For each threat: First, evaluate the risk (impact, probability, exploitation,
etc.) Then, choose a strategy
Redesign to eliminate Remove vulnerable features Add features reducing the
risk
Mitigate Apply standard mitigations Design new ones (riskier)
Accept the risk Make the risk explicit You could also
transfer it
Never ignore threats (one word: GDRP)
Publisher Broker Subscriber What Tampering Information disclosure How Man-in-the-middle Strategy
Mitigate: use TLS
Publisher Broker Subscriber What Spoofing How Man-in-the-middle Malicious Broker Strategy
Mitigate: use TLS Mitigate: use authentication
Publisher Broker Subscriber What Tampering How Unsecured persistence mechanism Strategy
Accept risk? Redesign: disable persistence? Mitigate: setup system-level protections? Mitigate: encrypt end-to-end?
You don’t have one threat model Final note
How to integrate threat modeling in your R&D?
Schedule a 4 hours meeting Invite half the devs, half
the ops and some people with long titles Have them produce a 20-pages long threat model
Do what fits your culture
Dedicated meetings/projects Back-to-the-envelope Opportunistic meetings How?
Whiteboard picture Meetings notes Full documentation Delivery?
Don’t care. Just do it.
Architecture reviews Threat modeling @ Oodrive
Feedbacks-oriented meeting before any major changes enter development Eg. new
service, major refactoring
Ensuring best practices Identifying subjects that need closer follow-ups Providing
feedbacks and challenging architectural choices
Not a threat modeling meeting per-se… … more like «
Hey! While we’re all here … » Parasite-security
Security checklists Threat modeling @ Oodrive
Use HSTS Must be HTTPS-only Store secrets inside Vault Have
anti-CSRF mechanism … See Spring-Security ?
Ready-to-use (implicit) threat models Focus on mitigations Validated during security
reviews
Slack’s goSDL Threat modeling elsewhere https://github.com/slackhq/goSDL https://slack.engineering/moving-fast-and-securing- things-540e6c5ae58a
None
None
None
Should you threat model?
Yes! (obviously)
At least once
Know your(s) threat model(s)!
Questions? Thank you To win! Icons created by Tomas Knopp,
Edwin Prayogi M and Dima Lagunov from the thenounproject.com