Threat Modeling For Cloud Computing: Keke Chen
Threat Modeling For Cloud Computing: Keke Chen
Lecture 15
Keke Chen
Threat Model
A threat model helps in analyzing a security problem, design mitigation strategies, and evaluate solutions
Steps:
Identify attackers, assets, threats and other components Rank the threats Choose mitigation strategies Build solutions based on the strategies
3
Threat Model
Basic components
Attacker modeling
Choose what attacker to consider Attacker motivation and capabilities
Vulnerabilities / threats
Client
Attackers
Outsider?
At cloud provider
Log client communication
10
11
12
Pk_B(m)
A Pk_A(r) M
Pk_B(m)
Pk_A(r) B
13
14
Assets
Confidentiality:
Data stored in the cloud Configuration of VMs running on the cloud Identity of the cloud users Location of the VMs running client code
15
Assets
Integrity
Data stored in the cloud Computations performed on the cloud
16
Assets
Availability
Cloud infrastructure SaaS / PaaS
17
18
19
Spoofing identity
illegally obtaining access and use of another persons authentication information
Man in the middle URL phishing Email address spoofing (email spam)
20
21
Repudiation
a legitimate transaction will be disowned by one of the participants
You sign a document first; and refused to confirm the signature Need a trusted third party to mitigate
22
Information/data disclosure
an attacker can gain access, without permission, to data that the owner doesnt want him or her to have.
23
Denial of service
an explicit attempt to prevent legitimate users from using a service or system. It involves the overuse of legitimate resources. You can stop all such attacks by removing the resource used by the attacker, but then real users cant use the resource either.
24
Escalation of privilege
an unprivileged user gains privileged access.
E.g. unprivileged user who contrives a way to be added to the Administrators group
25
Typical threats
Threat type Spoofing identity Tampering with data
Repudiation
Mitigation technique
Authentication Protect secrets Do not store secrets Authorization Hashes Message authentication codes Digital signatures Tamper-resistant protocols Digital signatures Audit trails
[STRIDE]
26
28