Thank you for your interest in VerSprite’s Process for Attack Simulation and Threat Analysis (PASTA)
- /
- /
- /
- /
- /
- /
- /
- /
- /
- /
- /
- /
- /
- /
- /
- /
- /
- /
- /
- /
- /
- /
Why PASTA as a Threat Modeling Framework Has Been Adopted Worldwide
The Process for Attack Simulation and Threat Analysis (PASTA) provides businesses with a strategic process for mitigating cybercrime risks by looking first and foremost at cyber threat mitigation as a business problem. PASTA aims to give an in-depth process for simulating attacks to your applications. Organizations can address posed threats and mitigate potential cyber risks by analyzing threats originating from simulated attacks.
The process provides tactical steps to follow and effective countermeasures for mitigating existing vulnerabilities by analyzing the attacks that can exploit these vulnerabilities and mapping these attacks to threat scenarios that specifically focus on the application as a business-asset target.
VerSprite’s penetration testing methodology is based on emulating realistic attacks by a malicious actor through our Process for Attack Simulation and Threat Analysis (PASTA).
PASTA consists of a seven-stage process for simulating attacks and analyzing threats to the organization and application in scope to minimize risk and associated impact on the business. This risk-based threat modeling approach goes beyond traditional threat modeling by enabling a company to make security decisions driven by business objectives.
This posture to both application and network security that VerSprite takes by assessing the operational impact and the threats to the business before evaluating the security of the applications, services, and infrastructure in scope helps us understand the vulnerabilities and remediate them in a business-rationalized manner.
Thus, each penetration test exercise begins by modeling the threat to understand an attacker’s motivation and possible targets. Then we identify likely attacks that can cross technologies, people, and processes and assess the strength of the countermeasures to resist attacks. This allows for decisions about mitigating these vulnerabilities based on the operational risk to the business.
After this first phase of engagement, VerSprite can acquire the following information to then walk through the corresponding methodology, selected based on the type of engagement:
- Business objectives for the application/service/infrastructure in scope
- Business use cases that are the most critical/sensitive
- Abuse cases that are the most critical/sensitive for the business
- Possible Threat Actors targeting the application/service/infrastructure in scope
- Principal Threat Motives
- Type of targeted information and assets in scope
This approach allows VerSprite to understand security from business and attacker perspectives to model and simulate realistic attacks during the engagement, pressure tests the targeted security posture, and provide critical insights and recommendations aligning security with business.
VerSprite’s methodology during client engagements is proportional to the type of security effort provided and the objectives for the exercise. As seasoned security professionals, the team recognizes the effectiveness of industry frameworks and standards across an array of security disciplines but simultaneously understands that there are no one-size-fits-all solutions.
As a result, VerSprite combines both custom and industry-standard methodologies as part of the consulting engagements to align the client deliverables and security services with an industry-acceptable level of security management.
- /
- /
- /
- /
- /
- /
- /
- /
- /
- /
- /
- /
- /
- /
- /
- /
- /
- /
- /
- /
- /
- /
The 7 Stages of PASTA Threat Modeling
(Process for Attack Simulation & Threat Analysis):
1. Define Business Context of Application
This considers the inherent application risk profile and address other business impact considerations early in the SDLC or for given Sprint under Scrum activities.
2. Technology Enumeration
You can’t protect what you don’t know is the philosophy behind this stage. It’s intended to decompose the technology stack that supports the application components that realize the business objectives identified from Stage 1.
3. Application Decomposition
Focuses on understanding the data flows amongst application components and services in the application threat model.
4. Threat Analysis
Reviews threat assertions from data within the environment as well as industry threat intelligence that is relevant to service, data, and deployment model.
5. Weakness / Vulnerability Identification
dentifies the vulnerabilities and weaknesses within the application design and code and correlates to see if it supports the threat assertions from the prior stage.
6. Attack Simulation
This stage focuses on emulating attacks that could exploit identified weaknesses/vulnerabilities from the prior stage. It helps to also determine the threat viability via attack patterns.
7. Residual Risk Analysis
This stage centers around remediating vulnerabilities or weaknesses in code or design that can facilitate threats and underlying attack patterns. It may warrant some risk acceptance by broader application owners or development managers.
- /
- /
- /
- /
- /
- /
- /
- /
- /
- /
- /
- /
- /
- /
- /
- /
- /
- /
- /
- /
- /
- /
Allow us to tailor a PASTA application threat model for your application so you can effectively apply the risk-centric methodology within the regiment of their software security assurance process.
- /
- /
- /
- /
- /
- /
- /
- /
- /
- /
- /
- /
- /
- /
- /
- /
- /
- /
- /
- /
- /
- /
Process for Attack Simulation & Threat Analysis
The Risk-Centric Threat Modeling Methodology
VerSprite leverages our PASTA (Process for Attack Simulation & Threat Analysis) methodology to apply a risk-based approach to threat modeling. This methodology integrates business impact, inherent application risk, trust boundaries amongst application components, correlated threats, and attack patterns that exploit identified weaknesses from the threat modeling exercises. Prior to PASTA, most application threat models were not even considering actual threats.
As the name implies, a key goal for threat modeling is to do just that – model threats. Threat categorization mnemonics (like STRIDE) are helpful for beginners, but product managers and their superiors are eager to know which threats are topical to their business, product, and platform. Furthermore, limiting threats to a handful of categories may not include the actual threats adversarial groups are planning.
PASTA provides a risk-centric threat modeling approach that is evidence-based. VerSprite’s security experts correlate real threats to your attack surface of application components and identify risk by first understanding the context of what the software or application is intended to do for the business or its clients. We also conduct exploitation tests that support threat motives within the model to validate whether they are probabilistic. Correlating viability with sustained impact allows this methodology to resonate as a highly effective risk-focused threat modeling approach.
Applying PASTA to Penetration Testing
The use of PASTA and VerSprite’s Threat Modeling methodology will guide the ensuing penetration test exercise, which can be performed in different ways depending on the approach to take and how much information is to be shared during the testing. The best way to see this is as follows:
- Blackbox Application Penetration Testing takes a DAST (Dynamic Application Security Testing) approach and assumes no prior information is provided about the target. With this type of approach, VerSprite attempts to simulate an attack by a threat that would have little to no insight into the environment or application architecture.
- Whitebox Application Penetration Testing takes a SAST (Static Application Security Testing) approach where the source code of the application is provided for its review. Depending on the size of the application, this can be time consuming, but if performed along with an application threat model, this could be the way to go if you are looking to find as many issues as possible and understand if secure development best practices are being followed. If a test environment is available during the exercise, every finding can be validated dynamically to provide a better Proof of Concept that shows the real impact of exploiting the vulnerability
- Greybox Application Penetration Testing takes a DAST approach, and credentials are provided to perform authenticated testing. Additional documentation can be shared around the environment and architecture of the application to help in understanding its inner working and how the different components work together. If the source code of the application is also provided in order to support the testing, the Application Pentest takes a mixed approach between dynamic and static analysis instead. This Greybox approach allows for combining the convenience of DAST with the depth of analysis provided by SAST, which not only saves time during dynamic testing but also enables the possibility of going deeper in the review of critical functions to the business.
- /
- /
- /
- /
- /
- /
- /
- /
- /
- /
- /
- /
- /
- /
- /
- /
- /
- /
- /
- /
- /
- /
Modeling your application for threats helps to preemptively address security within your software development lifecycle. There’s more to threat modeling than mapping a handful of threat categories to your application and building a data flow diagram. Learn how we can tailor the PASTA approach to fit your development timelines and maximize the output of application threat models.
- /
- /
- /
- /
- /
- /
- /
- /
- /
- /
- /
- /
- /
- /
- /
- /
- /
- /
- /
- /
- /
- /
Key Characteristics of PASTA – Risk-Centric Threat Modeling
1. It is a Methodology
If you’re looking for a process to follow, PASTA is designed for that. With seven phases with underlying activities in each phase, this approach is intended to guide new and experienced threat modelers across risk-centric application threat modeling activities.
2. Risk-Focused
PASTA not only looks at the variables of threat, vulnerability, countermeasures, and impact. Most importantly, it considers the probability of each variable and other supporting qualities like threat motives, current threat evidence, and countermeasure effectiveness.
3. Collaborative
Most threat modeling exercises simply include an audience of developers. This is a limited approach since developers depend on design, underlying infrastructure, managed corporate services (e.g. SSO, IAM, PKI, etc.), and the configuration of open frameworks. For this reason, architects, DevOps team members, systems engineers, business analysts, and SOC team members are also good candidates for collaborative threat modeling discussions under PASTA.
4. Prescriptive
In the end, PASTA is focused on providing prescriptive guidance on the exploitable vulnerabilities that are of greater priority. The last phase, residual risk analysis, focuses on addressing security countermeasures to non-accepted application risks and providing remediation alternatives, all depending on the team’s risk impact considerations, threat likelihood, and cost of countermeasure implementation.
5. Evidence-based
Concrete evidence around quantitative business impact values, threat information driven threat assertions, and attack trees with probability values on each branch help to denote threat likelihood.
6. Maturity Modeling Integration
Whether you have never done threat modeling before or are a team of security champions, the activities defined within each phase of PASTA can correlate to both BSIMM and OpenSAMM maturity models for secure software development programs. Inquire more on how you can track maturity over time with PASTA and these maturity models.
7. Pre-emptive Compliance
PASTA considers technical requirements for applications as part of its first stage since non-compliance can affect product assurance towards varying regulatory requirements.
- /
- /
- /
- /
- /
- /
- /
- /
- /
- /
- /
- /
- /
- /
- /
- /
- /
- /
- /
- /
- /
- /
Regardless of the type of engagement, VerSprite takes a complete manual approach for testing; automated testing is only an option for breadth of coverage or when necessary to complement certain tests. This guarantees a more in depth understanding of the target which ends up providing better quality results in terms of findings plus no false positives and real POCs for each of the issues found.
- /
- /
- /
- /
- /
- /
- /
- /
- /
- /
- /
- /
- /
- /
- /
- /
- /
- /
- /
- /
- /
- /