11.07.2015 Views

Improving Web Application Security: Threats and - CGISecurity

Improving Web Application Security: Threats and - CGISecurity

Improving Web Application Security: Threats and - CGISecurity

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

66 Part I: Introduction to <strong>Threats</strong> <strong>and</strong> CountermeasuresSummaryGenerating a Work Item ReportFrom the initial threat model, you can create a more formalized work item report thatcan include additional attributes, such as a Bug ID, which can be used to tie the threatin with your favorite bug tracking system. In fact, you may choose to enter theidentified threats in your bug tracking system <strong>and</strong> use its reporting facilities togenerate the report. You can also include a status column to indicate whether or notthe bug has been fixed. You should make sure the report includes the original threatnumber to tie it back to the threat model document.Organize the threats in the report by network, host, <strong>and</strong> application categories. Thismakes the report easier to consume for different team members in different roles.Within each category, present the threats in prioritized order starting with the onesgiven a high risk rating followed by the threats that present less risk.While you can mitigate the risk of an attack, you do not mitigate or eliminate theactual threat. <strong>Threats</strong> still exist regardless of the security actions you take <strong>and</strong> thecountermeasures you apply. The reality in the security world is that youacknowledge the presence of threats <strong>and</strong> you manage your risks. Threat modelingcan help you manage <strong>and</strong> communicate security risks across your team.Treat threat modeling as an iterative process. Your threat model should be a dynamicitem that changes over time to cater to new types of threats <strong>and</strong> attacks as they arediscovered. It should also be capable of adapting to follow the natural evolution ofyour application as it is enhanced <strong>and</strong> modified to accommodate changing businessrequirements.Additional ResourcesFor additional related reading, see the following resources:● For information on attack patterns, see “Attack Modeling for Information <strong>Security</strong><strong>and</strong> Survivability,” by Andrew P. Moore, Robert J. Ellison, <strong>and</strong> Richard C. Lingerat http://www.cert.org/archive/pdf/01tn001.pdf●●●For information on evaluating threats, assets <strong>and</strong> vulnerabilities, see“Operationally Critical Threat, Asset, <strong>and</strong> Vulnerability Evaluation (OCTAVE)Framework, Version 1.0” on the Carnegie Mellon Software Engineering Institute<strong>Web</strong> site at http://www.sei.cmu.edu/publications/documents/99.reports/99tr017/99tr017figures.htmlFor a walkthrough of threat modeling, see “Architect <strong>Web</strong>Cast: Using ThreatModels to Design Secure Solutions” at http://www.microsoft.com/usa/webcasts/ondem<strong>and</strong>/1617.aspFor more information on creating DFDs, see Writing Secure Code, Second Edition, byMichael Howard, David C. LeBlanc.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!