Ali Yazdani

Real-world Threat Modeling

How can you find critical security vulnerabilities before writing a single line of code? Learn to apply threat modeling in the earliest design phase.

Real-world Threat Modeling
#1about 3 minutes

Why shift left security is crucial for modern development

High-cost bug bounties for production vulnerabilities demonstrate the need to integrate security earlier in the software development lifecycle.

#2about 2 minutes

What threat modeling is and where it fits in development

Threat modeling is a structured process to identify and mitigate security risks during the design phase, before coding begins.

#3about 3 minutes

Understanding core security concepts and their relationships

A clear definition of terms like weakness, vulnerability, attack, and risk helps to understand how threats exploit system weaknesses.

#4about 2 minutes

Introducing the six components of the STRIDE methodology

The STRIDE framework categorizes threats into six types: Spoofing, Tampering, Repudiation, Information Disclosure, Denial of Service, and Elevation of Privilege.

#5about 3 minutes

Using data flow diagrams to apply the STRIDE model

The STRIDE workflow involves creating data flow diagrams (DFDs) and applying the six threat categories to each DFD element to identify potential issues.

#6about 2 minutes

Exploring four options for handling identified security threats

Once a threat is identified, it can be addressed by mitigating, eliminating, transferring, or formally accepting the associated risk.

#7about 2 minutes

Building a multi-level data flow diagram for an application

A practical example demonstrates how to build a data flow diagram for a ticketing system, starting from a high-level view and adding more detail in subsequent levels.

#8about 1 minute

How to define and use trust boundaries in threat modeling

Establishing clear trust boundaries within an application architecture is a critical first step for identifying where threats are most likely to cross.

#9about 4 minutes

Using OWASP Threat Dragon for practical threat modeling

The open-source tool OWASP Threat Dragon helps visualize the data flow diagram, identify threats for each component, and track mitigation plans.

Related jobs
Jobs that call for the skills explored in this talk.

Featured Partners

Related Articles

View all articles
DC
Daniel Cranney
Dev Digest 188: CfP time, the risks of NPM and IKEA algorithms
Inside last week’s Dev Digest 188 . 🤖 GitHub Copilot CLI is now in public review 💻 Microsoft is bringing ‘vibe working’ to office apps 🎣 Attackers abuse AI tools to generate captchas in fishing attacks ⚠️ When LLMs autonomously attack 🧠 Common cause...
Dev Digest 188: CfP time, the risks of NPM and IKEA algorithms
CH
Chris Heilmann
Dev Digest 138 - Are you secure about this?
Hello there! This is the 2nd "out of the can" edition of 3 as I am on vacation in Greece eating lovely things on the beach. So, fewer news, but lots of great resources. Many around the topic of security. Enjoy! News and ArticlesGoogle Pixel phones t...
Dev Digest 138 - Are you secure about this?

From learning to earning

Jobs that call for the skills explored in this talk.