threat-modeling.mdโข13.4 kB
---
name: "Threat Modeling"
description: "Systematic approach to identifying, analyzing, and mitigating security threats in systems and applications"
type: "skill"
version: "1.0.0"
author: "DollhouseMCP"
created: "2025-07-23"
category: "security"
tags: ["threat-modeling", "security-analysis", "risk-assessment", "architecture", "security-design"]
proficiency_levels:
beginner: "Basic threat identification using simple frameworks"
intermediate: "STRIDE methodology and attack tree analysis"
advanced: "Custom frameworks and quantitative risk modeling"
parameters:
methodology:
type: "string"
description: "Threat modeling methodology"
default: "STRIDE"
enum: ["STRIDE", "PASTA", "OCTAVE", "TRIKE", "VAST", "hybrid"]
scope:
type: "string"
description: "Analysis scope"
default: "application"
enum: ["application", "system", "network", "organization", "supply_chain"]
risk_appetite:
type: "string"
description: "Organization's risk tolerance"
default: "moderate"
enum: ["low", "moderate", "high", "very_high"]
compliance_requirements:
type: "array"
description: "Regulatory requirements to consider"
default: []
enum: ["PCI-DSS", "HIPAA", "GDPR", "SOX", "ISO27001", "NIST"]
_dollhouseMCPTest: true
_testMetadata:
suite: "bundled-test-data"
purpose: "General test data for DollhouseMCP system validation"
created: "2025-08-20"
version: "1.0.0"
migrated: "2025-08-20T23:47:24.347Z"
originalPath: "data/skills/threat-modeling.md"
---
# Threat Modeling Skill
This skill provides systematic threat modeling capabilities using industry-standard methodologies to identify, analyze, and prioritize security threats in complex systems.
## Core Capabilities
### 1. Threat Identification
- **Asset Inventory**: Critical data, systems, and processes
- **Attack Surface Mapping**: Entry points and interfaces
- **Threat Actor Profiling**: Capabilities, motivations, and resources
- **Attack Vector Analysis**: Potential paths to compromise
### 2. Risk Assessment
- **Likelihood Evaluation**: Probability of successful attacks
- **Impact Analysis**: Business and technical consequences
- **Risk Prioritization**: Cost-benefit analysis for mitigations
- **Quantitative Modeling**: Expected annual loss calculations
### 3. Mitigation Strategy
- **Control Selection**: Preventive, detective, and corrective controls
- **Defense in Depth**: Layered security architecture
- **Residual Risk**: Remaining risk after mitigations
- **Continuous Monitoring**: Threat landscape evolution
### 4. Documentation & Communication
- **Threat Models**: Visual representations and narratives
- **Risk Registers**: Centralized risk tracking
- **Security Requirements**: Derived from threat analysis
- **Executive Reporting**: Business-focused risk communication
## Threat Modeling Methodologies
### STRIDE Framework
```
SPOOFING
โโโ Identity spoofing attacks
โโโ Authentication bypass
โโโ Impersonation threats
โโโ Credential theft scenarios
TAMPERING
โโโ Data integrity attacks
โโโ Man-in-the-middle
โโโ Code injection
โโโ Configuration manipulation
REPUDIATION
โโโ Non-repudiation failures
โโโ Log tampering
โโโ Audit trail gaps
โโโ Transaction disputes
INFORMATION DISCLOSURE
โโโ Data exposure
โโโ Privacy violations
โโโ Information leakage
โโโ Unauthorized access
DENIAL OF SERVICE
โโโ Resource exhaustion
โโโ Service disruption
โโโ Availability attacks
โโโ Performance degradation
ELEVATION OF PRIVILEGE
โโโ Privilege escalation
โโโ Authorization bypass
โโโ Administrative access
โโโ System compromise
```
### PASTA (Process for Attack Simulation and Threat Analysis)
```
Stage 1: Define Objectives
โข Business impact analysis
โข Compliance requirements
โข Security objectives
โข Success criteria
Stage 2: Define Technical Scope
โข Application architecture
โข Technology stack
โข Network topology
โข Data flows
Stage 3: Application Decomposition
โข Use cases and user roles
โข Entry and exit points
โข Trust boundaries
โข Dependencies
Stage 4: Threat Analysis
โข Attack scenarios
โข Threat agent capabilities
โข Attack vectors
โข Vulnerability correlation
Stage 5: Weakness Analysis
โข Design flaws
โข Implementation bugs
โข Configuration errors
โข Process weaknesses
Stage 6: Attack Modeling
โข Attack trees
โข Kill chains
โข Attack scenarios
โข Exploitation paths
Stage 7: Risk Analysis
โข Business impact
โข Technical impact
โข Likelihood assessment
โข Risk scoring
```
## Threat Modeling Process
### Phase 1: System Understanding
```
Architecture Analysis:
โข System boundaries and scope
โข Data flow diagrams (DFDs)
โข Trust boundaries identification
โข External dependencies mapping
Components Inventory:
โข Web servers and applications
โข Databases and data stores
โข Network infrastructure
โข Third-party services
โข Human processes
Data Classification:
โข Sensitive data identification
โข Data flow mapping
โข Storage locations
โข Processing activities
โข Retention requirements
```
### Phase 2: Threat Identification
```
Threat Enumeration:
Using STRIDE per element:
Process Threats:
โโโ Spoofing: Fake service instances
โโโ Tampering: Code injection attacks
โโโ Repudiation: Log manipulation
โโโ Information Disclosure: Memory dumps
โโโ Denial of Service: Resource exhaustion
โโโ Elevation of Privilege: Buffer overflows
Data Store Threats:
โโโ Spoofing: Rogue databases
โโโ Tampering: Direct DB access
โโโ Repudiation: Audit trail gaps
โโโ Information Disclosure: Data dumps
โโโ Denial of Service: Storage exhaustion
โโโ Elevation of Privilege: DB admin access
Data Flow Threats:
โโโ Spoofing: Man-in-the-middle
โโโ Tampering: Packet modification
โโโ Repudiation: Message alteration
โโโ Information Disclosure: Eavesdropping
โโโ Denial of Service: Connection flooding
โโโ Elevation of Privilege: Protocol exploits
```
### Phase 3: Risk Analysis
```
Likelihood Assessment:
โข Threat actor capabilities
โข Attack complexity
โข Required resources
โข Detection probability
โข Success rate
Impact Assessment:
โข Confidentiality impact
โข Integrity impact
โข Availability impact
โข Business disruption
โข Regulatory violations
โข Reputation damage
Risk Calculation:
Risk = Likelihood ร Impact ร Vulnerability
Where:
โข Likelihood: 1-5 scale (Very Low to Very High)
โข Impact: 1-5 scale (Minimal to Catastrophic)
โข Vulnerability: 0.1-1.0 (Well Protected to Exposed)
```
### Phase 4: Mitigation Planning
```
Control Categories:
PREVENTIVE CONTROLS:
โข Input validation
โข Authentication mechanisms
โข Authorization checks
โข Encryption implementation
โข Network segmentation
DETECTIVE CONTROLS:
โข Logging and monitoring
โข Intrusion detection
โข Anomaly detection
โข Security scanning
โข Audit mechanisms
CORRECTIVE CONTROLS:
โข Incident response
โข Backup and recovery
โข Patch management
โข Configuration management
โข Business continuity
DETERRENT CONTROLS:
โข Security policies
โข Legal agreements
โข Awareness training
โข Physical security
โข Compliance monitoring
```
## Attack Tree Analysis
### Example: Web Application Login Bypass
```
Goal: Gain Unauthorized Access to User Account
OR
โโโ Credential-based Attacks
โ OR
โ โโโ Password Attacks
โ โ OR
โ โ โโโ Brute Force (AND)
โ โ โ โโโ No account lockout
โ โ โ โโโ Weak password policy
โ โ โ โโโ No rate limiting
โ โ โโโ Dictionary Attack (AND)
โ โ โ โโโ Common passwords used
โ โ โ โโโ No complexity requirements
โ โ โโโ Credential Stuffing (AND)
โ โ โโโ Breached credentials available
โ โ โโโ Users reuse passwords
โ โโโ Social Engineering (AND)
โ โโโ Phishing successful
โ โโโ User provides credentials
โ โโโ No 2FA implemented
โ
โโโ Technical Vulnerabilities
โ OR
โ โโโ SQL Injection (AND)
โ โ โโโ Unparameterized queries
โ โ โโโ Insufficient input validation
โ โ โโโ Database errors exposed
โ โโโ Session Management (AND)
โ โ โโโ Session fixation possible
โ โ โโโ Weak session tokens
โ โ โโโ No session timeout
โ โโโ Authentication Bypass (AND)
โ โโโ Logic flaws in auth code
โ โโโ Race conditions
โ โโโ Parameter tampering
โ
โโโ Infrastructure Attacks
OR
โโโ Network Interception (AND)
โ โโโ Unencrypted traffic
โ โโโ Man-in-the-middle position
โ โโโ Credential capture tools
โโโ System Compromise (AND)
โโโ Server vulnerability
โโโ Privilege escalation
โโโ Database access
```
## Threat Intelligence Integration
### Threat Actor Profiles
```
NATION-STATE ACTORS:
โข Capabilities: Advanced persistent threats
โข Motivations: Espionage, infrastructure disruption
โข Resources: Significant funding and expertise
โข Typical TTPs: Zero-day exploits, supply chain attacks
CYBERCRIMINALS:
โข Capabilities: Sophisticated tools and techniques
โข Motivations: Financial gain
โข Resources: Organized crime networks
โข Typical TTPs: Ransomware, banking trojans, fraud
INSIDER THREATS:
โข Capabilities: Authorized access and knowledge
โข Motivations: Financial, ideological, revenge
โข Resources: System access and credentials
โข Typical TTPs: Data exfiltration, sabotage
HACKTIVISTS:
โข Capabilities: Moderate technical skills
โข Motivations: Political or social causes
โข Resources: Community support
โข Typical TTPs: DDoS, website defacement, leaks
SCRIPT KIDDIES:
โข Capabilities: Limited technical skills
โข Motivations: Curiosity, recognition
โข Resources: Publicly available tools
โข Typical TTPs: Automated attacks, known exploits
```
## Output Formats
### Executive Threat Model Summary
```
THREAT MODEL EXECUTIVE SUMMARY
System: [Application/System Name]
Date: [Assessment Date]
Methodology: STRIDE + Attack Trees
RISK SUMMARY:
โข Critical Risks: X
โข High Risks: Y
โข Medium Risks: Z
โข Low Risks: W
TOP THREATS:
1. [Threat Name] - Risk Score: X.X
Impact: [Business consequence]
Likelihood: [Probability assessment]
2. [Threat Name] - Risk Score: X.X
Impact: [Business consequence]
Likelihood: [Probability assessment]
3. [Threat Name] - Risk Score: X.X
Impact: [Business consequence]
Likelihood: [Probability assessment]
RECOMMENDED MITIGATIONS:
1. [Priority 1 Control] - Addresses X threats
2. [Priority 2 Control] - Addresses Y threats
3. [Priority 3 Control] - Addresses Z threats
RESIDUAL RISK: [Acceptable/Needs Review/Unacceptable]
```
### Technical Threat Analysis
```
THREAT: [Specific Threat Name]
ID: THR-001
STRIDE Category: [S/T/R/I/D/E]
DESCRIPTION:
[Detailed threat scenario description]
AFFECTED ASSETS:
โข [Asset 1] - [Impact type]
โข [Asset 2] - [Impact type]
THREAT ACTORS:
โข [Actor Type] - [Capability Level]
โข [Motivation] - [Resource Level]
ATTACK VECTORS:
1. [Vector 1] - [Complexity: Low/Medium/High]
2. [Vector 2] - [Complexity: Low/Medium/High]
PREREQUISITES:
โข [Condition 1]
โข [Condition 2]
IMPACT ANALYSIS:
โข Confidentiality: [High/Medium/Low]
โข Integrity: [High/Medium/Low]
โข Availability: [High/Medium/Low]
โข Business Impact: [Description]
LIKELIHOOD ASSESSMENT:
โข Attack Complexity: [Low/Medium/High]
โข Required Skills: [Basic/Intermediate/Advanced]
โข Required Access: [None/User/Admin]
โข Overall Likelihood: [1-5 scale]
EXISTING CONTROLS:
โข [Control 1] - [Effectiveness: High/Medium/Low]
โข [Control 2] - [Effectiveness: High/Medium/Low]
RECOMMENDED MITIGATIONS:
1. [Mitigation 1] - [Cost: $X, Effort: Y days]
2. [Mitigation 2] - [Cost: $X, Effort: Y days]
ACCEPTANCE CRITERIA:
[Conditions under which residual risk is acceptable]
```
## Integration Capabilities
### Works Best With:
- **Security Analyst Persona**: Strategic security expertise
- **Penetration Testing Skill**: Validation of identified threats
- **Code Review Skills**: Implementation vulnerability correlation
- **Risk Assessment Templates**: Consistent risk documentation
- **Architecture Documentation**: System understanding
### Tool Integration:
- **Microsoft Threat Modeling Tool**: Visual diagram creation
- **OWASP Threat Dragon**: Web-based threat modeling
- **IriusRisk**: Automated threat identification
- **ThreatModeler**: Enterprise threat modeling platform
## Continuous Threat Modeling
### Iterative Process:
1. **Initial Assessment**: Baseline threat model creation
2. **Regular Reviews**: Quarterly threat landscape updates
3. **Change Triggers**: Architecture modifications, new threats
4. **Validation Testing**: Penetration testing correlation
5. **Metrics Tracking**: Threat model effectiveness measurement
### Automation Opportunities:
- **Asset Discovery**: Automated inventory updates
- **Threat Intelligence**: Feed integration for new threats
- **Control Validation**: Automated testing of mitigations
- **Risk Scoring**: Dynamic risk calculation updates