HomeD1: Security & Risk Mgmt › Threat Modeling & Threat Intelligence
Domain 1 · Lesson 9 of 10

Threat Modeling & Threat Intelligence

Mô hình Mối đe dọa & Tình báo Bảo mật

What is Threat Modeling?

Threat modeling is the process of systematically identifying potential threats to a system and designing countermeasures — ideally done before building the system, not after. It answers: "What could go wrong? Who would attack? How?"

STRIDE Framework (Microsoft)

STRIDE is an asset/system-centric framework that categorizes threats into 6 types. Each letter represents a threat category.

LetterThreatTiếng ViệtViolatesPlatform C Example
S Spoofing Giả mạo danh tính Authenticity Fake Partner D API call without valid HMAC signature — attacker impersonates Partner D
T Tampering Giả mạo dữ liệu Integrity Attacker modifies loan disbursement amount in transit between Platform C and Bank A H2H
R Repudiation Phủ nhận hành động Non-repudiation Customer denies signing Partner A loan contract — mitigated by eSign Vendor eSign audit trail
I Information Disclosure Tiết lộ thông tin Confidentiality PII (NRIC, income data) exposed via misconfigured API endpoint without auth
D Denial of Service Từ chối dịch vụ Availability Flood of fake KYC initiation requests exhausts eKYC Vendor API quota, blocking real users
E Elevation of Privilege Leo thang đặc quyền Authorization Bypass credit check stage in Temporal workflow — client sends "approved" status without server validation

DREAD — Risk Rating Framework

DREAD is a risk scoring framework (not threat categorization like STRIDE). Used to RATE the severity of identified threats. Each category scored 1-10; total = priority score.

LetterCategoryTiếng ViệtQuestion to AskScore Guide
DDamage PotentialMức độ thiệt hạiHow severe if exploited?1=minimal, 10=full system compromise
RReproducibilityKhả năng tái tạoHow easy to reproduce the attack?1=very hard, 10=always works
EExploitabilityKhả năng khai thácHow much skill needed?1=expert only, 10=automated tool available
AAffected UsersSố người dùng bị ảnh hưởngHow many users impacted?1=single user, 10=all users
DDiscoverabilityKhả năng phát hiện bởi kẻ tấn côngHow easy to find the vulnerability?1=very hard, 10=publicly known

DREAD vs STRIDE: STRIDE = categorizes threat types (what kind of attack?); DREAD = rates risk severity (how bad is this threat?). Use both together: STRIDE to identify, DREAD to prioritize.

Example: OTP brute-force on Platform C login endpoint

D=8 (account takeover), R=9 (automated tool), E=7 (scripting skill), A=10 (all users), D=10 (publicly known endpoint) → DREAD score = 44/50 → HIGH priority to fix

Mitigation: 5/hr OTP rate limit + sliding window → reduces R=2, E=2 → new score = 29/50 → much lower priority

Other Threat Modeling Methods

PASTA
Process for Attack Simulation and Threat Analysis
7-stage, attacker-centric method. Focuses on attacker goals and business risk. More comprehensive but complex.
Attack Trees
Hierarchical threat diagrams
Tree structure mapping all possible ways to achieve an attack goal. Root = goal; branches = attack paths.
DREAD
Risk scoring model
Rates threats: Damage + Reproducibility + Exploitability + Affected users + Discoverability. Scores help prioritize fixes.

Threat Intelligence

Intelligence Types by Audience

TypeAudienceContentExample
StrategicExecutives, BoardHigh-level trends, adversary motivations, business risk context"Nation-state actors increasingly targeting fintech in SEA"
TacticalSecurity architects, CISOsAdversary TTPs (Tactics, Techniques, Procedures)"APT group uses spear phishing followed by Cobalt Strike lateral movement"
OperationalSOC, incident responseSpecific ongoing campaigns and threat actor activity"Campaign targeting PH fintech loan apps via fake SMS OTP links this week"
TechnicalEngineers, security toolsIOCs: IPs, domains, file hashes, YARA rulesBlocklist of known malicious IPs targeting eKYC APIs

IOC vs IOA

IOC — Indicators of Compromise
Evidence of past/present breach

Known artifacts from previous attacks: IP addresses, file hashes, domain names, registry keys, email addresses. Used to detect known threats.

Reactive: requires knowing what the attack looks like
IOA — Indicators of Attack
Behavioral signals of active attack

Behavioral patterns suggesting an attack is in progress: unusual privilege escalation, mass file access, beaconing patterns, lateral movement. Detects unknown attacks.

Proactive: detects behavior even if attacker is new/unknown

APT vs Opportunistic Attacker

CharacteristicAPT (Advanced Persistent Threat)Script Kiddie / Opportunistic
MotivationStrategic (espionage, disruption, financial theft at scale)Notoriety, quick gain, experimentation
ResourcesNation-state level — well-funded, skilled teamsLow skill; uses pre-built tools
PatienceLong dwell time — months to years in networkHit-and-run; quick scans
TargetingSpecific high-value targetsOpportunistic — targets whoever is vulnerable
StealthHighly stealthy; designed to evade detectionNoisy; often detected quickly

MITRE ATT&CK Framework

A publicly available knowledge base of adversary tactics and techniques observed in real-world attacks. Used for threat hunting, detection rule development, and security gap analysis.

Reconnaissance Resource Development Initial Access Execution Persistence Privilege Escalation Defense Evasion Lateral Movement Exfiltration

Key Terms

TermTiếng ViệtDefinition
STRIDEMô hình STRIDEMicrosoft threat categorization: Spoofing, Tampering, Repudiation, Information Disclosure, DoS, Elevation
PASTAPhân tích PASTA7-stage attacker-centric threat modeling focused on business risk and attack simulation
Threat ModelingMô hình hóa mối đe dọaSystematic process to identify threats and design countermeasures before building systems
IOCChỉ số xâm phạmArtifacts from known attacks: IPs, hashes, domains — used for detection
IOAChỉ số tấn côngBehavioral patterns indicating an attack is in progress — detects unknowns
APTMối đe dọa dai dẳng nâng caoSophisticated, patient, well-funded threat actor (typically nation-state sponsored)
TTPChiến thuật, kỹ thuật, quy trìnhTactics, Techniques, Procedures — the how and why of adversary behavior
MITRE ATT&CKMa trận ATT&CKPublic knowledge base of adversary tactics and techniques for threat hunting
Exam Tips
  1. 1. STRIDE mnemonic: Spoofing, Tampering, Repudiation, Information Disclosure, Denial of Service, Elevation of Privilege. Each maps to a CIA/security property violation.
  2. 2. STRIDE vs PASTA: STRIDE is asset-centric (what can happen to this component?); PASTA is attacker-centric (what does the attacker want to achieve?). PASTA is more comprehensive but more complex.
  3. 3. IOC = past/present evidence of compromise (file hash, IP) — backward-looking. IOA = behavioral indicators of active attack — forward-looking. "Detecting known malware by hash" = IOC. "Detecting unusual privilege escalation pattern" = IOA.
  4. 4. APT = patient + stealthy + targeted — opposite of noisy opportunistic attackers. APT dwell time may be months before detection. Nation-state actors are typically APTs.
  5. 5. MITRE ATT&CK is used for threat hunting and detection rule building, not for vulnerability assessment (that's more CVSS/CVE territory).
Work Application — STRIDE on Platform C eKYC Flow

Running STRIDE against the Platform C eKYC Vendor eKYC integration:

STRIDEThreat in Platform C eKYCMitigation
SpoofingAttacker submits fake liveness video to pass biometric checkeKYC Vendor liveness detection; certificate pinning on SDK
TamperingModify eKYC result (PASS→FAIL or vice versa) in transit from eKYC Vendor to Platform CmTLS channel + result payload signed by eKYC Vendor private key
RepudiationCustomer denies submitting selfie for eKYC; claims it was forgedAudit trail: timestamp + OTP authorization at KYC step; eSign Vendor consent record
Info DisclosureBiometric data (face scan, NRIC) exposed in transit or in logsmTLS; no PII in application logs; encrypted payload storage
DoSBulk fake KYC requests exhaust eKYC Vendor API quota, blocking real usersRate limiting per user/IP; per-customer KYC session tokens with TTL
EoPSkip KYC stage in Temporal workflow — client signals "KYC complete" without server validationServer-side stage enforcement; Temporal activities validate KYC result from eKYC Vendor directly, never trusting client payload

Practice Questions

Q1. An attacker steals a user's valid session token and makes requests as that user without knowing their password. Which STRIDE category does this represent?

A) Spoofing — the attacker is impersonating the legitimate user using stolen credentials/tokens
Rationale: Spoofing is about impersonating another entity — pretending to be someone or something you are not. Using a stolen session token to act as a legitimate user is spoofing. It violates Authenticity — the system cannot trust that the request is from the real user. Mitigations: short-lived tokens, session binding, re-authentication for sensitive actions.

Q2. A security team needs to model threats based on what an attacker is trying to achieve (their goals and motivations) rather than what could happen to specific system components. Which framework is most appropriate?

A) PASTA — Process for Attack Simulation and Threat Analysis; attacker-centric, focuses on attacker goals and business risk
Rationale: PASTA is an attacker-centric framework that asks "What does the attacker want?" and works backward from attack goals. STRIDE is asset-centric — it asks "What could happen to this component?" For a mature threat modeling program that incorporates threat actor motivation, PASTA is the right choice. STRIDE is often used for component-level threat enumeration.

Q3. The Platform C security team is told that a known malware campaign uses a specific file hash (SHA256: abc123...). They add this to their EDR blocklist. What type of intelligence indicator is the file hash?

A) IOC (Indicator of Compromise) — a known artifact from a previous/current attack used to detect known threats
Rationale: File hashes are a classic IOC — they are specific artifacts (SHA256 of a known malicious file) from confirmed malware campaigns. IOCs are reactive: they help detect threats that have already been identified. IOAs, by contrast, are behavioral indicators (unusual privilege escalation, anomalous login patterns) that detect attacks even if the specific tools are unknown.

Q4. A threat actor targeting FinTech Company X's Platform C platform maintains access for 8 months without detection, slowly exfiltrating loan applicant data. Which threat actor type does this describe?

A) APT (Advanced Persistent Threat) — patient, stealthy, targeted, and resourced for long-duration operations
Rationale: APT characteristics: (1) Advanced — sophisticated techniques, custom tools; (2) Persistent — long dwell time, not hit-and-run; (3) Targeted — specific organization or data. An 8-month undetected presence with systematic data exfiltration is the hallmark of a nation-state or well-funded criminal APT. Script kiddies and opportunistic attackers are detected quickly due to their noisy methods.

Q5. Which primary use case is the MITRE ATT&CK framework designed for?

A) Threat hunting and detection engineering — mapping attacker TTPs to detection rules and coverage gaps
Rationale: MITRE ATT&CK is a knowledge base of adversary TTPs observed in real attacks, organized by tactic (what they want to achieve) and technique (how they do it). Its primary use cases are: (1) threat hunting — searching for adversary behavior in logs; (2) detection engineering — building SIEM rules; (3) red team/purple team exercises; (4) measuring security coverage gaps. It is not a vulnerability assessment framework (that's CVSS/NVD).