Frameworks

Threat Modeling Frameworks #

STRIDE #

Microsoft’s mnemonic for threat categories. Apply per-element on DFD.

ThreatDefinitionViolated PropertyTypical Target
SpoofingImpersonating something/someoneAuthenticationExternal entities, processes
TamperingModifying data or codeIntegrityData flows, data stores
RepudiationDenying actionsNon-repudiationProcesses
Information DisclosureExposing dataConfidentialityData flows, data stores
Denial of ServiceDegrading availabilityAvailabilityAll elements
Elevation of PrivilegeGaining unauthorized accessAuthorizationProcesses

STRIDE-per-Element #

DFD ElementApplicable Threats
External EntityS, R
ProcessS, T, R, I, D, E
Data StoreT, R, I, D
Data FlowT, I, D

DREAD (Risk Scoring) #

Score 1-10 for each factor, average for overall risk.

FactorQuestion
DamageHow bad if exploited?
ReproducibilityHow easy to reproduce?
ExploitabilityHow easy to exploit?
Affected usersHow many impacted?
DiscoverabilityHow easy to find?
DREAD is deprecated at Microsoft due to subjectivity. Consider CVSS or custom risk matrices.

Attack Trees #

Hierarchical decomposition of attack goals.

[Root: Compromise User Account]
├── [OR] Steal Credentials
│   ├── [AND] Phishing
│   │   ├── Craft email
│   │   └── User clicks link
│   ├── [OR] Credential stuffing
│   └── [OR] Keylogger
├── [OR] Session Hijacking
│   ├── XSS to steal cookie
│   └── Network sniffing (no TLS)
└── [OR] Account Recovery Abuse
    └── Social engineer support

Annotations #

  • Cost: Resources needed (time, money, skill)
  • Probability: Likelihood of success
  • Detection: Chance of being caught
  • Boolean: AND (all children needed) vs OR (any child sufficient)

Cyber Kill Chain (Lockheed Martin) #

Sequential phases of an intrusion:

PhaseDescriptionDefender Action
1. ReconnaissanceResearch targetOSINT monitoring
2. WeaponizationCreate exploit payloadThreat intel
3. DeliveryTransmit payload (email, USB, web)Email filtering, WAF
4. ExploitationTrigger vulnerabilityPatching, sandboxing
5. InstallationPersist on systemEDR, integrity monitoring
6. C2Establish command channelNetwork monitoring, DNS filtering
7. Actions on ObjectivesExfil, destroy, ransomDLP, backups

MITRE ATT&CK #

Knowledge base of adversary tactics and techniques based on real-world observations.

TacticExample Techniques
Initial AccessPhishing, supply chain compromise
ExecutionPowerShell, scheduled tasks
PersistenceRegistry run keys, implant
Privilege EscalationToken manipulation, exploits
Defense EvasionObfuscation, rootkits
Credential AccessDumping, keylogging
Lateral MovementPass-the-hash, RDP
ExfiltrationC2 channel, cloud storage

When to Use What #

FrameworkBest For
STRIDESystematic design review, DFD-based analysis
Attack TreesSpecific attack goal analysis, cost modeling
Kill ChainIncident response, detection gap analysis
MITRE ATT&CKDetection engineering, red team planning

Written by Claude Opus 4.5