The purpose of this activity is to help you enumerate and model
the security of your system architecture by looking at it from the point of
view of threats.
According to the Microsoft Threat Modeling methodology, we treat the word
"threat" as a class of exploits. They fall into the following
categories (STRIDE):
·
Spoofing
·
Tampering
·
Repudiation
·
Information Disclosure
·
Denial of Service
·
Elevation of Privilege
Today, let's model Dropbox. Dropbox is a cloud-based storage system for your desktop and
mobile devices. Store a file in a folder on your desktop, and it gets
immediately uploaded to the server, and synchronized across all of your
registered devices. Users can share folders in their Dropbox, allowing other
users or the public view the files. Also, each change to a file is kept in a
version history, so that users can revert to old copies of their files. All of
this can be managed via a desktop client, a mobile client, and a webapp.
One feature you may not know about Dropbox is their de-duplication engine. The clients
maintain a local list of hashes of the files in your folder. When a file is
changed, Dropbox re-computes the hash, and sends all of the hashes to the
server. The server then uses this logic on each hash:
§ New change. If the server doesn't have the hash, upload the file.
§ No change. If the server has the
hash associated with the user's account already, no files are uploaded.
§ De-duplicate. If the server has the
hash already, but another user owns it, then make a record that a user is
storing a copy of the file associated with that hash (i.e. no files are
uploaded, just some bookkeeping)
De-duplication can provide a huge
speedup in upload times and a gives big savings in storage for Dropbox. It also
may have some security risks that may become apparent once we do some threat
modeling.
Additionally, Dropbox servers are
spread across multiple physical sites, and data is replicated across those
sites for reliability and performance. This replication is handled by a single
database management system. Mobile and desktop clients (even the webapp) all interact
with a common API.
Note: you may make reasonable assumptions about the features of the
system for the sake of this exercise. This link may be helpful for
understanding how Dropbox works.
This activity is for groups.
1.
Discuss as a group briefly what the architecture of
the system will look like.
2.
Fire up the Microsoft Threat Modeling tool. Before
going further, save your file, calling it Dropbox.tm4.
The tool can be found here.
3.
Start your model by creating processes, interactors and stores.
4.
Next, add data
flow relationships. Be sure to name every relationship with a noun
describing a type
of data. For example, "Authentication Data" or
"Passwords" are types of data that would flow from one primitive to
another. Note: you can
have multiple dataflows from one primitive to another. Don't go too crazy with
it - try to name your data in the most useful way possible.
5.
Next, add trust
boundaries.
6.
For each primitive in the diagram, update the Properties to be as realistic as possible.
7.
Now go to Analyze model.
8.
Expand a
few of the items. Notice the vast number of potential threats that can arise.
9.
Let's eliminate some threats to be generated with some
assumptions. Discuss as a group which threat categories you believe are not
possible in Dropbox. Change those to "Not Applicable". Be ready to
discuss your choice with the class.
10.
Now let's revise
a threat, getting our inspiration from the diagram. Start with DenialOfService on a data store. Fill in the potential
mitigations you might take.
11.
Now let's also test your model. Try to think of a
security concern in your system. This can be a design concern or
domain-specific vulnerability. Where does it fit in your model? If it doesn't,
revise the model a bit.
12.
Pick three more elements, and come up with a threat
for each of those (just pick one category of threat).
13.
At this point, check
the report by going to Generate
Reports in the
lower-left. Note anything you believe is missing.
14.
Continue adding
threats to the system. Be ready to discuss your results with the class.
Submit the final document to LMS.
You have to put your name and ID on the document.
Get Free Quote!
269 Experts Online