Applying A Threat Model 1 : Microsoft STRIDE

Threat Assessment is the process of examining a design architecture from a high level to identify any security risks and plan suitable mitigations.

In this case, we are protecting the confidentiality, integrity and availability of our data.

What is STRIDE?

  • One of the many approaches but each has its own shared concepts.
  • Open-source and we'll documented as part of Microsoft's Secure Development approaches.
  • Microsoft developed threat assessment methodology.

STRIDE

S - Spoofing T - Tampering R - Repudiation I - Information Disclosure D - Denial of service E - Escalation

Is STRIDE the right tool for you?

Advantages

  • Simple framework that can be easy to remember .
  • No license fees or external costs.
  • Relatively non-technical.
  • Free tools available for modelling.

Disadvantages

  • Aimed more at traditional software architectures.
  • Tools are often very Microsoft centric and may be a time sink.
  • Doesn't consider likelihood or impact as part of the assessments.

Now, we break down STRIDE into it's independent definition.

  • Spoofing - is the act of pretending to be another user, device or system and emulating traffic they might send or actions they might take.
  • Tampering - is the unauthorized or malicious modification of data.
  • Repudiation - is the ability to conduct an action within a system and deny ownership of that action.
  • Information Disclosure - is a loss of data confidentiality as a result of unauthorized disclosure of information.
  • Denial of Service - is the process of interacting with a system or service in such a way that it is unable to provide service or functionality to others.
  • Escalation of privilege - is the process of gaining access to systems, data or functionality that exceed your assigned privileges.