Page 37 - Risk Management Bulletin April-June 2022
P. 37

RMAI BULLETIN APRIL - JUNE 2022


             regularly. The threat modeling landscape is too complex  the requirement and the corresponding mitigation. In
             with old assumptions being regularly challenged.  this way, by reporting all mitigations that are still open,
                                                              the security posture across a software portfolio is
             A good example of this is the gradual decline of implied  immediately realized and benchmarked against a given
             trust and the rise of zero trust. With so many mitigations  threshold. This information is useful to business
             to consider and only one vulnerability being sufficient  stakeholders in making decisions around risk mitigation.
             for an attacker to exploit, we have great asymmetry.
             This asymmetric nature of security implies a need for a  Growing A Knowledge Base
             more efficient way to understand the risk in a complex  Over time, a repeating set of threats and remediation
             technology landscape. The way to manage complexity
                                                              patterns will begin to emerge. Capturing this type of
             is to diversify our security perspectives. This is in line
                                                              recurring information in  a knowledge base and
             with thinking about threats from an attacker's   propagating it across similar architectures can save time
             perspective; they work from several different
                                                              and allow us to scale our threat modeling. For example,
             perspectives (as witnessed through advanced persistent
                                                              teams no longer need to spend time conducting threat
             threats). Cross-functional teams help by reducing threat
                                                              modeling for similar types of applications only to
             modeling bias based on personal preference or
                                                              recommend similar mitigations. The knowledge base
             experience. The different perspectives provide
                                                              can also ingest additional information from the efforts
             opportunities to consider additional attack patterns.
                                                              of other organizations like NIST and MITRE. In this way,
                                                              the value of the knowledge base increases as it
             Increasing The Level Of Automation               accumulates knowledge from a wider set of
             When we describe automation, we generally try to  vulnerability and remediation data.
             remove as much human intervention as possible. This
             improves consistency and increases speed.        Threat Modeling Is Now A Critical
             Unfortunately, as of today,  we don't have fully
             automated threat modeling. There is work being done  Business Capability
             to bring the benefits of AI into threat modeling. As of  Threat modeling has now become a critical capability
             now, however, we still need a consistent way to rapidly  for business leaders. It helps to identify areas of security
             translate recommended  mitigations  from  threat  risk, a board-level imperative. Not only that, but it also
             modeling into actionable stories that have clear exit  provides the steps required to mitigate the threat. This
             criteria-something developers can execute against.  provides a basis for cost/benefit analysis. Areas of
                                                              software security risk must be analyzed and remediated
             The answer to this lies in creating a map between  without sacrificing speed and agility. To a business
             vulnerability mitigations and software code (which does  stakeholder, having this type of information available
             not preclude configuration files and other "as code"  in a timely manner can make a huge difference in
             artifacts). Using such a map, a test is triggered to verify  managing operational risk and value delivery.
























                                                           35
   32   33   34   35   36   37   38   39   40