Supply Chain & Threat Modeling
Supply Chain Risks
Supply Chain Evaluation
-
Onsite Assessment: This includes visiting the organization, interviewing people, and observing their operating habits to ensure they meet safety and security standards.
-
Document Exchange and Review: Analyze how an organization manages information exchange and conducts assessments and reviews.
-
Process/Policy Review: Request and review the vendor's security policies, processes, and procedures to ensure they align with your organization's standards.
-
Third-party Audit: Enlist an independent auditor to provide an unbiased review of the vendor's security infrastructure.
Threat Modeling
-
Assets: Uses asset valuation results to identify threats to the most valuable assets.
-
Attackers: Identify potential attackers and threats based on the attackers' goals.
-
Software: Considers potential threats against the software the organization develops.
Risk Management Frameworks (RMF)
NIST 800-37
NIST 800-37: By the National Institute of Standards and Technology, a non-regulatory US agency.
-
Categorize Info Systems: Understand and label systems based on their security needs.
-
Selecting Security Controls: Choose necessary controls to mitigate identified risks.
-
Implement Security Controls: Put the selected controls into action within the systems.
-
Assess Security Controls: Regularly check and validate the effectiveness of the controls.
-
Authorize Security Controls: Ensure the controls adhere to organizational policies.
-
Monitor Security Controls: Continuously oversee and report on the performance of security controls.
Some references include a 7th step: "Prepare to execute the RMF". However, this isn't part of the CISSP syllabus.
STRIDE
-
Spoofing:Spoofing: This involves falsifying identity, such as presenting as another user or system. -
Tampering:Tampering: This involves data manipulation or unauthorized changes in the system. -
Repudiation:Repudiation: This is staging an attack in such a way that the attacker can deny their involvement. -
Information
Disclosure:Disclosure: This involves unauthorized access to information. -
Denial of Service (DoS): This refers to attacks aimed at making a system unavailable or inaccessible.
-
Elevation of
Privilege:Privilege: This involves unauthorized increases in privilege or access within the system.
Spoofing differsis from repudiation as spoofing involves presenting aabout false identity to gain unauthorized access,identity, while repudiation refersis tothe andenial attacker'sof ability to deny actions afterpost-attack.
PASTA
-
Definition of
Objectives:Objectives: Establishing clear objectives for threat modeling. -
Definition of Technical
Scope:Scope: Identifying the systems, applications, and data to be protected. -
Application Decomposition &
Analysis:Analysis: Breaking down the application into its components and analyzing each for potential vulnerabilities. -
Threat
Analysis:Analysis: Identifying potential threats to the system. -
Weakness & Vulnerability
Analysis:Analysis: Identifying and analyzing the weaknesses and vulnerabilities that can be exploited by the threats. -
Attack Modeling &
Simulation:Simulation: Modeling potential attack vectors and simulating their impacts. -
Risk Analysis &
Management:Management: Evaluating the risks posed by the identified threats and developing strategies to manage them.
VAST
DREAD
-
Damage Potential: How severe could the damage be if the threat is realized?
-
Reproducibility: How easy is it for attackers to reproduce the exploit?
-
Exploitability: How difficult is it to perform the attack?
-
Affected Users: What percentage of users (internal or external) are likely to be affected by the attack?
-
Discoverability: How difficult is it for an attacker to discover this weakness? A significant weakness 7-8 layers deep with defense in depth may not be as big of a deal
A major weakness 7-8 layers deep with defense might not be as concerning.
TRIKE
COBIT
-
Meeting Stakeholder Needs: Ensuring the organization meets the needs of stakeholders.
-
Covering the Enterprise End-to-End: Considering the full scope of the enterprise.
-
Applying a Single, Integrated Framework: Implementing a centralized, coordinated approach.
-
Enabling a Holistic Approach: Taking into account all aspects of the organization.
-
Separating Governance from Management:
DistinguishingDifferentiate oversight from daily operations.
COBIT distinguishes between governance (oversight,strategy strategy,and risk decisions)oversight) and management (day-to-daydaily execution)tasks).