11.07.2015 Views

Improving Web Application Security: Threats and - CGISecurity

Improving Web Application Security: Threats and - CGISecurity

Improving Web Application Security: Threats and - CGISecurity

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Chapter 3: Threat Modeling 65Table 3.7 shows an example DREAD rating for both threats:Table 3.7 DREAD ratingThreat D R E A D Total RatingAttacker obtains authenticationcredentials by monitoring the network.3 3 2 2 2 12 HighSQL comm<strong>and</strong>s injected into application. 3 3 3 3 2 14 HighOnce you have obtained the risk rating, you update the documented threats <strong>and</strong> addthe discovered rating level, which is High for both of the above threats. Table 3.8shows an example.Table 3.8 Threat 1Threat DescriptionThreat targetRisk ratingAttack techniquesCountermeasuresAttacker obtains authentication credentials by monitoring the network<strong>Web</strong> application user authentication processHighUse of network monitoring softwareUse SSL to provide encrypted channelWhat Comes After Threat Modeling?The output of the threat modeling process includes documentation of the securityaspects of the architecture of your application <strong>and</strong> a list of rated threats. The threatmodel helps you orchestrate development team members <strong>and</strong> focus on the mostpotent threats.Important Threat modeling is an iterative process. The threat model is a document that evolves<strong>and</strong> that various team members can work from.The threat model can be used by the following groups of people:● Designers can use it to make secure design choices about technologies <strong>and</strong>functionality.● Developers who write code can use it to mitigate risks.● Testers can write test cases to test if the application is vulnerable to the threatsidentified by the analysis.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!