Skip to content
  • Categories
  • Recent
  • Tags
  • Popular
  • World
  • Users
  • Groups
Skins
  • Light
  • Brite
  • Cerulean
  • Cosmo
  • Flatly
  • Journal
  • Litera
  • Lumen
  • Lux
  • Materia
  • Minty
  • Morph
  • Pulse
  • Sandstone
  • Simplex
  • Sketchy
  • Spacelab
  • United
  • Yeti
  • Zephyr
  • Dark
  • Cyborg
  • Darkly
  • Quartz
  • Slate
  • Solar
  • Superhero
  • Vapor

  • Default (Cyborg)
  • No Skin
Collapse
Brand Logo

CIRCLE WITH A DOT

  1. Home
  2. Uncategorized
  3. A poll on a debate I am having at work with a colleague.

A poll on a debate I am having at work with a colleague.

Scheduled Pinned Locked Moved Uncategorized
threatmodelthreatmodelingappseciac
6 Posts 3 Posters 18 Views
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • paco@infosec.exchangeP This user is from outside of this forum
    paco@infosec.exchangeP This user is from outside of this forum
    paco@infosec.exchange
    wrote last edited by
    #1

    A poll on a debate I am having at work with a colleague.

    In my case, the code we are considering is infrastructure-as-code; so terraform, cloudformation, CDK, etc. So I'm not as focused on app code like React, NodeJS, Python, etc. Infrastructure code. I'll put my opinions in a reply to this post so that I don't bias answers.

    Asserted: You can do a threat model in the IDE using only the code and artifacts present in the repo.

    #threatmodel #threatmodeling #appsec #iac

    paco@infosec.exchangeP floriann@infosec.exchangeF 2 Replies Last reply
    0
    • paco@infosec.exchangeP paco@infosec.exchange

      A poll on a debate I am having at work with a colleague.

      In my case, the code we are considering is infrastructure-as-code; so terraform, cloudformation, CDK, etc. So I'm not as focused on app code like React, NodeJS, Python, etc. Infrastructure code. I'll put my opinions in a reply to this post so that I don't bias answers.

      Asserted: You can do a threat model in the IDE using only the code and artifacts present in the repo.

      #threatmodel #threatmodeling #appsec #iac

      paco@infosec.exchangeP This user is from outside of this forum
      paco@infosec.exchangeP This user is from outside of this forum
      paco@infosec.exchange
      wrote last edited by
      #2

      I assert that the vast majority of what you need to do a threat model is not present in the code repository. What are we trying to build? What could go wrong? etc.

      Having done a threat model, knowing what you're worried about, you can then inspect your code and see what risks are well mitigated and what risks are not well mitigated. But looking at the code doesn't tell you what you're concerned about.

      My colleague is on the other side, asserting that a sufficiently clever LLM agent, prompted with the right prompt and the artifacts in the repo, will be able to do something we could call a threat model.

      I believe the artifacts you're likely to find in a code repo will not cover things like money, liability, regulatory context, etc. So without adding a bunch of information/artifacts that would not normally be in a code repo, this can't produce what we would rightly call a threat model. Could we produce something valuable? Of course! But that thing needs a name other than threat model. I'm open to suggestions.

      arrjay@tacobelllabs.netA 1 Reply Last reply
      0
      • paco@infosec.exchangeP paco@infosec.exchange

        I assert that the vast majority of what you need to do a threat model is not present in the code repository. What are we trying to build? What could go wrong? etc.

        Having done a threat model, knowing what you're worried about, you can then inspect your code and see what risks are well mitigated and what risks are not well mitigated. But looking at the code doesn't tell you what you're concerned about.

        My colleague is on the other side, asserting that a sufficiently clever LLM agent, prompted with the right prompt and the artifacts in the repo, will be able to do something we could call a threat model.

        I believe the artifacts you're likely to find in a code repo will not cover things like money, liability, regulatory context, etc. So without adding a bunch of information/artifacts that would not normally be in a code repo, this can't produce what we would rightly call a threat model. Could we produce something valuable? Of course! But that thing needs a name other than threat model. I'm open to suggestions.

        arrjay@tacobelllabs.netA This user is from outside of this forum
        arrjay@tacobelllabs.netA This user is from outside of this forum
        arrjay@tacobelllabs.net
        wrote last edited by
        #3

        @paco blast radius?

        arrjay@tacobelllabs.netA 1 Reply Last reply
        0
        • arrjay@tacobelllabs.netA arrjay@tacobelllabs.net

          @paco blast radius?

          arrjay@tacobelllabs.netA This user is from outside of this forum
          arrjay@tacobelllabs.netA This user is from outside of this forum
          arrjay@tacobelllabs.net
          wrote last edited by
          #4

          @paco oops all Fault Containers, that's where I'd heard this before...

          1 Reply Last reply
          0
          • paco@infosec.exchangeP paco@infosec.exchange

            A poll on a debate I am having at work with a colleague.

            In my case, the code we are considering is infrastructure-as-code; so terraform, cloudformation, CDK, etc. So I'm not as focused on app code like React, NodeJS, Python, etc. Infrastructure code. I'll put my opinions in a reply to this post so that I don't bias answers.

            Asserted: You can do a threat model in the IDE using only the code and artifacts present in the repo.

            #threatmodel #threatmodeling #appsec #iac

            floriann@infosec.exchangeF This user is from outside of this forum
            floriann@infosec.exchangeF This user is from outside of this forum
            floriann@infosec.exchange
            wrote last edited by
            #5

            @paco in my opinion you can only create a partial threat model and you pushed already in your answer you will need context to complete the model.

            paco@infosec.exchangeP 1 Reply Last reply
            0
            • floriann@infosec.exchangeF floriann@infosec.exchange

              @paco in my opinion you can only create a partial threat model and you pushed already in your answer you will need context to complete the model.

              paco@infosec.exchangeP This user is from outside of this forum
              paco@infosec.exchangeP This user is from outside of this forum
              paco@infosec.exchange
              wrote last edited by
              #6

              @floriann Where I disagree is that a threat model is meant to answer the question “did we build what we meant to build.” All the repo has is what we DID build. Generally, what we intended is only implied by what we did.

              Could we answer the question “is this software complete?” by looking only at artefacts in the repo?

              We can read and understand it. We can imagine use cases that are implied. We can decide if we think the use cases we imagined are covered by the code we see.

              I assert that it is not possible to look only at artefacts in the repo and determine whether the software is feature complete.

              Therefore it is also not possible to determine if the features of the software in the repo are “correct” with respect to what we intended to build.

              To make a simple example: if there is no authentication visible in the code, is that intentional (it’s a public thing), is it needed but not built yet, or is it needed and is provided elsewhere by other infrastructure (like a proxy)?

              The artefacts in a repository are unlikely to hold that answer. And while they MIGHT, I don’t think that is so common that it supports a statement like “you can threat model using only the artefacts in the repo.”

              1 Reply Last reply
              1
              0
              • R relay@relay.infosec.exchange shared this topic
              Reply
              • Reply as topic
              Log in to reply
              • Oldest to Newest
              • Newest to Oldest
              • Most Votes


              • Login

              • Login or register to search.
              • First post
                Last post
              0
              • Categories
              • Recent
              • Tags
              • Popular
              • World
              • Users
              • Groups