STRIDE#
STRIDE is currently the most mature threat-modeling method.
STRIDE is a model for identifying computer security threats developed by Praerit Garg and Loren Kohnfelder at Microsoft. It provides a mnemonic for security threats in six categories.
The threats are:
Spoofing
Tampering
Repudiation
Information disclosure (privacy breach or data leak)
Denial of service
Elevation of privilege
( source Wikipedia, support it!
Property |
Threat |
Definition |
Example |
Authentication |
Spoofing |
Impersonating something or someone else. |
Pretending to be any of billg, microsoft.com or ntdll.dll |
Integrity |
Tampering |
Modifying data or code |
Modifying a DLL on disk or DVD, or a packet as it traverses the LAN. |
Non-repudiation |
Repudiation |
Claiming to have not performed an action. |
“I didn’t send that email,” “I didn’t modify that file,” “I certainly didn’t visit that web site, dear!” |
Confidentiality |
Information Disclosure |
Exposing information to someone not authorized to see it |
Allowing someone to read the Windows source code; publishing a list of customers to a web site. |
Availability |
Denial of Service |
Deny or degrade service to users |
Crashing Windows or a web site, sending a packet and absorbing seconds of CPU time, or routing packets into a black hole. |
Authorization |
Elevation of Privilege |
Gain capabilities without proper authorization |
Allowing a remote internet user to run commands is the classic example, but going from a limited user to admin is also EoP. |