Ali Yazdani

Real-world Threat Modeling

How can you find critical security vulnerabilities before writing a single line of code? Learn to apply threat modeling in the earliest design phase.

Real-world Threat Modeling
#1about 3 minutes

Why shift left security is crucial for modern development

High-cost bug bounties for production vulnerabilities demonstrate the need to integrate security earlier in the software development lifecycle.

#2about 2 minutes

What threat modeling is and where it fits in development

Threat modeling is a structured process to identify and mitigate security risks during the design phase, before coding begins.

#3about 3 minutes

Understanding core security concepts and their relationships

A clear definition of terms like weakness, vulnerability, attack, and risk helps to understand how threats exploit system weaknesses.

#4about 2 minutes

Introducing the six components of the STRIDE methodology

The STRIDE framework categorizes threats into six types: Spoofing, Tampering, Repudiation, Information Disclosure, Denial of Service, and Elevation of Privilege.

#5about 3 minutes

Using data flow diagrams to apply the STRIDE model

The STRIDE workflow involves creating data flow diagrams (DFDs) and applying the six threat categories to each DFD element to identify potential issues.

#6about 2 minutes

Exploring four options for handling identified security threats

Once a threat is identified, it can be addressed by mitigating, eliminating, transferring, or formally accepting the associated risk.

#7about 2 minutes

Building a multi-level data flow diagram for an application

A practical example demonstrates how to build a data flow diagram for a ticketing system, starting from a high-level view and adding more detail in subsequent levels.

#8about 1 minute

How to define and use trust boundaries in threat modeling

Establishing clear trust boundaries within an application architecture is a critical first step for identifying where threats are most likely to cross.

#9about 4 minutes

Using OWASP Threat Dragon for practical threat modeling

The open-source tool OWASP Threat Dragon helps visualize the data flow diagram, identify threats for each component, and track mitigation plans.

Related jobs
Jobs that call for the skills explored in this talk.

Featured Partners

From learning to earning

Jobs that call for the skills explored in this talk.