Threat modeling is a powerful tool that organizations can use to identify, assess and mitigate risks. Modeling helps you visualize your organization’s risk landscape to make informed decisions about the most critical risks and how to prevent them. There are three primary phases of threat modeling: initiation, analysis, and resolution.
The Stride Model is a tool that simplifies the process of moving through these three phases. This blog post will discuss the Stride Model and its benefits. We will also provide an example of how it can be used to help understand the risk associated with a data breach.
What is the Stride Model?
Stride is a computer security risk assessment model focusing on the five phases of attack: survey, planning, execution, cleanup, and detection. The Stride model helps organizations identify and mitigate threats before they become successful attacks.
Surveillance is the initial phase of an attack. Attackers use surveillance to gather information about their target, including information about the resources available to them (such as computers and networks).
In planning, attackers decide what to do with the information they’ve gathered. They may decide how to attack their target or extract data from it.
Execution is the stage in which attackers carry out their plans. This can involve attacking targets or extracting information from them.
Cleanup is the stage after an attack has been successful or unsuccessful. Attackers often leave behind evidence that can be used to track them down, such as malware infections or logs of user activity. Detection is the process of identifying and using this evidence to track down the attackers.
The Stride Model of Threat Modeling
Threat modeling is a necessary process that helps organizations identify and mitigate potential risks. There are several phases of threat modeling, and the Stride model is one of the most popular.
The Stride model is a four-phase process that helps organizations identify, understand, assess, and prioritize risk.
In the first phase, called reconnaissance, organizations gather information about their target system.
In the second phase, understanding, they analyze the data collected in surveillance to understand how the target system works.
The third phase, analysis, determine how the target system could be compromised and used for malicious purposes.
The fourth and final phase, called mitigation, focuses on protecting the target system from possible attacks.
The Stride model is effective because it considers different aspects of risk. By analyzing data gathered in each phase, organizations can develop a complete picture of their target system and make better decisions about how to protect it.
The Threat Model in Action
There is no one correct answer to this question, as the threat model that works best for a given organization depends on the specific context and needs. However, there are three standard models used in security: the risk management model, the vulnerability assessment model, and the penetration testing model.
The risk management model is most often used by organizations that want to identify and assess risks before they become threats. This model evaluates risks based on their potential impact on organizational objectives. Organizations that wish to identify vulnerabilities before bad actors can exploit them use the vulnerability assessment model.
This model determines exposures based on their susceptibility to exploitation by unauthorized users. The penetration testing model is used by organizations that want to test whether their systems are vulnerable to attack. In this model, attackers are hired to attempt to breach systems, steal data, or execute malicious code.
The Elements of the Stride Model
The stride model is a Threat Modeling method that divides an organization’s environment into six phases: pre-attack, attack, post-attack, recovery, reconstitution, and resiliency.
Pre-Attack: This phase includes the time leading to an attempted or actual attack. During this phase, organizations must identify potential threats and assess their risks.
Attack: This is the stage during which an attacker tries to achieve their objective. During this stage, organizations must protect themselves from attacks against them.
Post-Attack: After an attack has been successful, organizations must deal with the aftermath of the attack. During this stage, they must clean up the damage and restore normal operations as quickly as possible.
Recovery: After an attack has been defeated, organizations need to rebuild and move forward. During this stage, they need to identify and fix what was damaged as quickly as possible.
Reconstitution: Once everything has been fixed and recovered, organizations must re-establish normal operations. This phase can be difficult because it will require new processes and systems to be put in place.
Resiliency: Organizations must continue building resilience even after a successful reconstitution period has ended. This phase emphasizes keeping systems online and protected even in the event of another attack.
Threat Modeling Basics
The Stride Model is a threat modeling phase that focuses on the outer perimeter of an organization. It begins with identifying the company’s Core Assets and then devising strategies to protect them. The next step is identifying threats to Core Assets and creating a plan to mitigate those risks. The final step is testing the program against actual attacks.
John Pescatore, a Professor at CMU’s School of Information Sciences and Technology, developed the Stride Model. He has written about the model extensively, and many organizations have adopted it as their standard threat modeling approach.
The Stride Model starts with identifying the company’s Core Assets. These are vital assets that are essential to the company’s survival and operations and must be protected from attack. In addition, threats to these assets need to be identified and analyzed to implement appropriate strategies to minimize those risks.
After the Core Assets have been identified, strategies must be created to protect them. This includes creating firewalls and antivirus protection for critical systems, installing security software on business-critical devices, shutting down unused servers when they’re not in use, etc. The goal is to make it difficult for would-be attackers or saboteurs to damage or take over these systems without causing significant damage.
Finally, tests need to be done to verify that the proper defenses have been implemented.
The stride model is the phase where you gather evidence and understand your threats. This typically includes researching, analyzing data, and building models that can help you know how a particular threat may impact your organization.