home | library | resume

Threat Model Framing

2025 Nov 27


Put this together when I was designing an encryption scheme for user data.

Threat Modeling Manifesto (link)

Five Functions (NIST)

STRIDE

From Adam Shostack, who wrote the canonical book on threat modeling:

|Threat Category|Violates|Examples| |---|---|---| |Spoofing|Authenticity|An attacker steals the authentication token of a legitimate user and uses it to impersonate the user.| |Tampering|Integrity|An attacker abuses the application to perform unintended updates to a database.| |Repudiation|Non-repudiability|An attacker manipulates logs to cover their actions.| |Information Disclosure|Confidentiality|An attacker extract data from a database containing user account info.| |Denial of Service|Availability|An attacker locks a legitimate user out of their account by performing many failed authentication attempts.| |Elevation of Privileges|Authorization|An attacker tampers with a JWT to change their role.|

Cyber Kill Chains

How attacks work, from Building Secure and Reliable Systems by Adkins et al:

| Reconnaissance: Surveilling a target victim to understand their weak points. | Attacker uses a search engine to find the email addresses of employees at a target organization. | Educate employees about online safety. | | ----------------------------------------------------------------------------------------------- | --------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- | ---------------------------------------------------------------------------------------------------------------------------------------- | | Entry: Gaining access to the network, systems, or accounts necessary to carry out the attack. | Attacker sends phishing emails to employees that lead to compromised account credentials. The attacker then signs in to the organization’s virtual private network (VPN) service using those credentials. | Use two-factor authentication (such as security keys) for the VPN service.Only permit VPN connections from organization-managed systems. | | Lateral movement: Moving between systems or accounts to gain additional access. | Attacker remotely logs in to other systems using the compromised credentials. | Permit employees to log in to only their own systems.Require two-factor authentication for login to multiuser systems. | | Persistence: Ensuring ongoing access to compromised assets. | Attacker installs a backdoor on the newly compromised systems that provides them with remote access. | Use application allowlisting that permits only authorized software to run. | | Goals: Taking action on attack goals. | Attacker steals documents from the network and uses the remote access backdoor to exfiltrate them. | Enable least privileged access to sensitive data and monitoring of employee accounts. |