Apply threat modeling principles effectively with step-by-step instructions and support material
Explore practical strategies and solutions to address identified threats, and bolster the security of your software systems
Develop the ability to recognize various types of threats and vulnerabilities within software systems
Purchase of the print or Kindle book includes a free PDF eBook
Description
Are you looking to navigate security risks, but want to make your learning experience fun? Here's a comprehensive guide that introduces the concept of play to protect, helping you discover the threats that could affect your software design via gameplay.
Each chapter in this book covers a suit in the Elevation of Privilege (EoP) card deck (a threat category), providing example threats, references, and suggested mitigations for each card. You’ll explore the methodology for threat modeling—Spoofing, Tampering, Repudiation, Information Disclosure, and Elevation of Privilege (S.T.R.I.D.E.) with Privacy deck and the T.R.I.M. extension pack. T.R.I.M. is a framework for privacy that stands for Transfer, Retention/Removal, Inference, and Minimization. Throughout the book, you’ll learn the meanings of these terms and how they should be applied. From spotting vulnerabilities to implementing practical solutions, the chapters provide actionable strategies for fortifying the security of software systems.
By the end of this book, you will be able to recognize threats, understand privacy regulations, access references for further exploration, and get familiarized with techniques to protect against these threats and minimize risks.
Who is this book for?
This book serves as both a reference and support material for security professionals and privacy engineers, aiding in facilitation or participation in threat modeling sessions. It is also a valuable resource for software engineers, architects, and product managers, providing concrete examples of threats to enhance threat modeling and develop more secure software designs. Furthermore, it is suitable for students and engineers aspiring to pursue a career in application security. Familiarity with general IT concepts and business processes is expected.
What you will learn
Understand the Elevation of Privilege card game mechanics
Get to grips with the S.T.R.I.D.E. threat modeling methodology
Explore the Privacy and T.R.I.M. extensions to the game
Identify threat manifestations described in the games
Implement robust security measures to defend against the identified threats
Comprehend key points of privacy frameworks, such as GDPR to ensure compliance
"Threat Modelling Gameplay with EoP" covers cybersecurity methodologies, focusing on threat modeling and the concept of Elevation of Privilege (EoP). Here's a deeper review of its likely content:Key Themes:Threat Modeling: It discusses threat modeling techniques essential for identifying vulnerabilities in software systems. Threat modeling aims to anticipate security threats and design countermeasures before exploitation occurs.Elevation of Privilege (EoP): This technique refers to situations where an attacker gains elevated access, bypassing system restrictions. The document may cover various scenarios where EoP attacks occur and how to mitigate them, serving as a guide to understanding how unauthorized users might exploit security flaws.Gameplay Approach: The integration of "gameplay" suggests a gamified approach to threat modeling. Gamification is often used in educational contexts to make complex, technical subjects more interactive and engaging. The gameplay might involve simulating different threat scenarios or vulnerabilities and allowing users to "play through" solutions to safeguard systems.Learning Objectives: The document could serve as a training tool, using scenarios in which learners are challenged to identify and mitigate risks, such as those posed by EoP. This method helps teach concepts of privilege escalation, threat analysis, and system hardening.Likely Sections of the Document:Introduction to Threat Modeling: Explanation of what threat modeling is, why it is essential, and its core elements.Understanding EoP: Details on how attackers leverage privilege escalation and their standard tactics.Gameplay Mechanics: If gameplay is part of the eBook, this section would describe the rules and scenarios where learners practice defending against threats.Case Studies/Examples: Real-world applications or hypothetical situations where EoP is a concern, guiding readers through identifying and mitigating these issues.Strengths: Interactive Learning: Incorporating gameplay likely encourages active learning, making this a more engaging resource than traditional textbooks.Focused on Real Threats: By concentrating on EoP, the document addresses a critical, real-world issue in cybersecurity.Impact: This approach seems tailored for cybersecurity professionals, students, or educators aiming to deepen their understanding of threat modeling dynamically and interactively. It balances technical details with practical, gamified learning, potentially making it a highly effective tool in cybersecurity education.
Amazon Verified review
Brandon G.Sep 13, 2024
5
"Threat Modeling Gameplay with EoP" by Brett Crawley is an excellent resource for anyone looking to improve their threat modeling skills using the Elevation of Privilege (EoP) card game.The book's structure, following the STRIDE+Privacy model and going through each card in the EoP deck, provides a comprehensive and systematic approach to understanding common security threats. Crawley does an great job of explaining each threat with real-world examples, making complex concepts accessible to readers at various skill levels.I particularly appreciated the inclusion of CAPEC, ASVS, and CWE references for each threat, allowing readers to dive deeper into specific areas of interest. The suggested mitigations for each threat are practical and actionable, giving readers immediate ways to improve their system's security posture.The additional coverage of the TRIM extension pack and the inclusion of alternative 2022 deck cards show the author's commitment to providing up-to-date and comprehensive information. The introductory chapters on game mechanics and important security concepts provide a solid foundation for those new to threat modeling or the EoP game.There are a few aspects that could be improved. Some readers might find the repetitive structure of threat-reference-mitigation for each card a bit monotonous, although this format does make the book an excellent reference guide.Additionally, while the book covers a wide range of threats, more in-depth discussions on how these threats interact and compound in real-world scenarios could provide even more value.Despite a few minor drawbacks, "Threat Modeling Gameplay with EoP" is an essential read for security professionals, software engineers, and anyone involved in designing secure systems. It successfully bridges the gap between theory and practice, making it a valuable addition to any security professional's library.
Amazon Verified review
Joern FSep 10, 2024
5
This excellent books transfers the EoP game into a well rounded training set for beginners in Threat Modeling! It serves as a comprehensive Guideline for playing the EOP game.I would not play this game without using the manual, in fact for beginners I would recommend using this book as a manual and then start playing the card game.I especially enjoyed reading about the privacy threats in the last chapters that cover the privacy extensions of the card games.The original cards are sometimes very abstract and require an abstract level of understanding that a beginner might not have developed yet. This book closes this gap byoutlining details of each card together with appropriate mitigation techniques. Additionally by referencing sources, e.g. ASVS for verification and CWE for each threat helps the practitioner building the mental framework on in which taxonomy the threats belong.
Amazon Verified review
PaulSep 06, 2024
5
I was able to get an early copy of Threat Modeling Gameplay with EoP and I wish I had this when I started my journey into Threat Modeling just over 2 years ago. I was suggested the game by my co-workers and there were some guides online but nothing to this level of detail. In reading this book I have even added some new tools to my kit, and I really think this should be required reading for anyone who wants to get into Threat Modeling. The Elevation of Privilege game was a good tool to learn how to be a good Threat Modeler but with this guide it becomes a great tool, and it will help you if you are just starting out or just want to sharpen your Threat Modeling skills.
Amazon Verified review
Ben RothkeSep 06, 2024
5
One of the most important information security books is Adam Shostack's Threat Modeling: Designing for Security. In a world where infosec books can be obsolete after a few years, Threat Modeling was first published over 14 years ago, but is still quite relevant.Threat modeling, as defined by OWASP, works to identify, communicate, and understand threats and mitigations within the context of protecting something of value. It's a process to identify threats to and design flaws in a system.A threat model is a structured representation of all the information that affects an application's security. In essence, it is a view of the application and its environment through the lens of security. Threat modeling can be applied to various things, including software, applications, systems, networks, distributed systems, Internet of Things (IoT) devices, and business processes.It's ironic that while there have been a few books on threat modeling, some of them don't even reference Shostack's book, even though it's clear they used it as a reference.When I saw Threat Modeling Gameplay with EoP: A Reference Manual For Spotting Threats In Software Architecture (Packt Publishing) by Brett Crawley, I was happy to see that not only was Shostack's book referenced, he also wrote the foreword.The gameplay in the title refers to the Elevation of Privilege (EoP) card game Shostack created. Its goal is to help software developers easily and quickly find threats in the software or underlying systems.The EoP card deck contains threat cards arranged in 6 suits based on STRIDE. Developed at Microsoft, STRIDE is a model for identifying computer security threats. STRIDE is a mnemonic for Spoofing, Tampering, Repudiation, Information disclosure (privacy breach or data leak), Denial of service, and Elevation of privilege.TRIM (Transfer, Retention/Removal, Inference, and Minimization) is an extension pack for STRIDE that focuses on privacy. It aims to enhance some of STRIDE's shortcomings since its creation two decades ago.Training around risk and risk modeling can be mind-numbing, and that's on a good day. But gamified threat modeling is a great way to train engineering teams to threat model. It will help them develop the skills needed.For each of the hundreds of threat models in the book, the card has a definition of the threat, entry numbers for CAPEC (Common Attack Pattern Enumerations and Classifications) and number, OWASP Application Security Verification Standard (ASVS), and detailed mitigation suggestions.Using a gamification approach in a team environment makes for an engagement training method. If this is done over repeated sessions, the team members will emerge with a thorough understanding of the threats they face. Since it is customized, these won't be the best practices types of threats—rather, they will be the real-world threats they have to secure their systems against.Threat modeling is an essential aspect of a comprehensive information security program. For those who want to ensure their staff knows how to deal with threats, the approach in Threat Modeling Gameplay with EoP can be of great value.
Amazon Verified review
Previous
1
2
Next
About the author
Brett Crawley
Brett Crawley
Brett Crawley is a principal application security engineer, (ISC2) CISSP, CSSLP, and CCSP certified, the project lead on the OWASP Application Security Awareness Campaigns project, and the author of the OSTERING blog on security. He has published a Miro template for threat modeling with the Elevation of Privilege card game and also published the CAPEC S.T.R.I.D.E. mapping mind maps and other resources.
With over 10 years of application security experience and over 25 years of software engineering experience, he works with teams to define their security best practices and introduce security by design into their existing SDLC, and as part of this initiative, he trains teams in threat modeling because good design is of key importance.
He is also an advocate for using a data-driven approach to AppSec, to help identify the business-critical components, thereby optimizing the reduction of risk to the organization.
A subscription provides you with full access to view all Packt and licnesed content online, this includes exclusive access to Early Access titles. Depending on the tier chosen you can also earn credits and discounts to use for owning content
How can I cancel my subscription?
To cancel your subscription with us simply go to the account page - found in the top right of the page or at https://subscription.packtpub.com/my-account/subscription - From here you will see the ‘cancel subscription’ button in the grey box with your subscription information in.
What are credits?
Credits can be earned from reading 40 section of any title within the payment cycle - a month starting from the day of subscription payment. You also earn a Credit every month if you subscribe to our annual or 18 month plans. Credits can be used to buy books DRM free, the same way that you would pay for a book. Your credits can be found in the subscription homepage - subscription.packtpub.com - clicking on ‘the my’ library dropdown and selecting ‘credits’.
What happens if an Early Access Course is cancelled?
Projects are rarely cancelled, but sometimes it's unavoidable. If an Early Access course is cancelled or excessively delayed, you can exchange your purchase for another course. For further details, please contact us here.
Where can I send feedback about an Early Access title?
If you have any feedback about the product you're reading, or Early Access in general, then please fill out a contact form here and we'll make sure the feedback gets to the right team.
Can I download the code files for Early Access titles?
We try to ensure that all books in Early Access have code available to use, download, and fork on GitHub. This helps us be more agile in the development of the book, and helps keep the often changing code base of new versions and new technologies as up to date as possible. Unfortunately, however, there will be rare cases when it is not possible for us to have downloadable code samples available until publication.
When we publish the book, the code files will also be available to download from the Packt website.
How accurate is the publication date?
The publication date is as accurate as we can be at any point in the project. Unfortunately, delays can happen. Often those delays are out of our control, such as changes to the technology code base or delays in the tech release. We do our best to give you an accurate estimate of the publication date at any given time, and as more chapters are delivered, the more accurate the delivery date will become.
How will I know when new chapters are ready?
We'll let you know every time there has been an update to a course that you've bought in Early Access. You'll get an email to let you know there has been a new chapter, or a change to a previous chapter. The new chapters are automatically added to your account, so you can also check back there any time you're ready and download or read them online.
I am a Packt subscriber, do I get Early Access?
Yes, all Early Access content is fully available through your subscription. You will need to have a paid for or active trial subscription in order to access all titles.
How is Early Access delivered?
Early Access is currently only available as a PDF or through our online reader. As we make changes or add new chapters, the files in your Packt account will be updated so you can download them again or view them online immediately.
How do I buy Early Access content?
Early Access is a way of us getting our content to you quicker, but the method of buying the Early Access course is still the same. Just find the course you want to buy, go through the check-out steps, and you’ll get a confirmation email from us with information and a link to the relevant Early Access courses.
What is Early Access?
Keeping up to date with the latest technology is difficult; new versions, new frameworks, new techniques. This feature gives you a head-start to our content, as it's being created. With Early Access you'll receive each chapter as it's written, and get regular updates throughout the product's development, as well as the final course as soon as it's ready.We created Early Access as a means of giving you the information you need, as soon as it's available. As we go through the process of developing a course, 99% of it can be ready but we can't publish until that last 1% falls in to place. Early Access helps to unlock the potential of our content early, to help you start your learning when you need it most. You not only get access to every chapter as it's delivered, edited, and updated, but you'll also get the finalized, DRM-free product to download in any format you want when it's published. As a member of Packt, you'll also be eligible for our exclusive offers, including a free course every day, and discounts on new and popular titles.