- Process for Securing assets
- IDENTIFY KEY THREATS
- Software for threat modeling
- Sources of Info, Standards
- How-to's
Process for Securing assets
Idea general: What are my key assets? Do I know where they are?
- Look at high risks
- Identify treatments
- Identify easy wins, high cost, biggest impact, most difficult to achieve (User resistance level) - use Essential 8 https://www.upguard.com/blog/essential-eight
- Address high risk areas
(And defining what those are)
IDENTIFY KEY THREATS
- What has happened to me?
- i.e. RW - Si alguna vez pasó, puede ser un riesgo
- Ataques web recientes o detecciones relevantes
- What has happened to those in my industry?
- What is happening in general?
- Vulnerabilidades o bugs de vendors (Si utilizo Cisco, un CVE reciente puede ser un riesgo)
- Based on my key assets, what worries me the most?
Software for threat modeling
- Draw.io
Sources of Info, Standards
NIST 800-30 "Guide for conducting Risk Assessments"
NIST 800-154 "Guide for data-centric Threat modeling"
OWASP Web application threat modeling
How-to's
Artículo
Enterprise Threat Model Technical Report
URL Original - Guide to Cyber Threat Modelling - Feb 2021.pdf1269.8KB
PDF Uploaded - pr_18-1613-ngci-enterprise-threat-model-technical-report.pdf1751.1KB
Threat Modeling for Cloud Infrastructures
Caso real de uso de STRIDE/DREAD para Telcom
Enterprise threat modeling technical report example - Usar de guía
Cyber Threat modeling - Survey of different frameworks