Answered step by step
Verified Expert Solution
Question
1 Approved Answer
Assignment - Threat Modeling Scenario The two main user types of this system are warehouse employees who use a proprietary Android app on a custom
Assignment Threat Modeling
Scenario
The two main user types of this system are warehouse employees who use a proprietary Android app on a custombuilt smart phone connected to an enterprise WiFi network. The device is equipped with a barcode scanner to quickly scan a product's label. It can be used to pick orders, or to update inventory levels. Each time a barcode is scanned, the app initiates a callback to a web API to pull product details. In addition, the barcode scan is used to add items to an order while picking, or through an override mechanism to update inventory levels of specific products.
All network traffic between the scanner and the API backend is encrypted using TLS All devices have their own security certificates, allowing for mutual authentication between the scanners and the API.
Before a warehouse employee can use the mobile app, they will need to authenticate themselves using username and password. The authentication step involves the app making an authentication assertion using SAMLv to an identity provider IdP The IdP verifies credentials against a backend identity management IDM system before returning a status code. The IdP and the IDM system are both connected to the enterprise network, which is accessible from the WiFi network in the warehouses. The devices are not set up to use cellular service.
The second group of users involves clients. Clients access the enterprise website using a browser. All browser traffic is encrypted using TLS Certificates are provided by Let's Encrypt. The site is built as a Django app and it is hosted in the cloud. Before being able to browse the products and before being able to order, clients must first authenticate using username and password. Secondfactor authentication using SMS text messaging is an optional layer of protection that each user can turn on themselves. The web app uses the WebAuthN protocol, which connects back to the same IdP as is used by the mobile app.
After successfully authenticating, the web app also uses the web API. For client calls, only the API server authenticates, since clients do not have their own certificates. All access control is implemented at the API level. The web API is able to query and update the product database, which is integrated with the organization's Enterprise Resource Planning ERP platform. The API also has builtin support for order completion, using a shopping cart model. Each client has their own discount scheme, which is determined to establish pricing and payment terms. This information is also stored in the database. The contents of the database are encrypted using AES using an appropriate mode of operation. The encryption key for the database is kept on a hardware crypto module that is external to the server.
In addition to accessing the API for its dynamic properties, the web app also pulls static content images etc. and presents it back to users in their browser.
Lastly, the web app must integrate with an external email service. The service is used to send order confirmation including tracking information to the clients. The web application does not accept any incoming email.
According to the overview and scenario above, follow Steps to draw a complete DFD diagram.
Step Review the scenario to identify terminals and data flows going to and from the terminals. Label each data flow appropriately. Provide a diagram. Include the first intermediate diagram in your solution.
Step Review the scenario again. This time, focus on identifying processes and the data flows originating from each process or arriving at each process. Add this information to your diagram. Include the second intermediate diagram in your solution.
Step Review the scenario again. Focus on checking what you already modeled, and fill in the data stores. Identify the data flows originating from each data store or arriving at each store. NOTE: at this stage, we are still technologyagnostic. Do not list enabling technologies, such as databases. Represent the nature of the data contained in a store instead. Add this information to your diagram. Now provide a dataflow diagram. Include the full DFD in your solution.
StepEnrich your DFD by identifying what architectural components provide each process and each data store. Such as Element : API ;Provided by Onsite API server
StepUsing the elements above, draw in boundaries that intersect data flows. Include the updated DFD with trust boundaries in your solution.
Boundary crossing: Client sends credentials from browser to IdP
The borders involved in assessing threats are spoofing, tampering, repudiation, information disclosure, denial of service, and elevation of privilege Then give their Potential Threats and Proposed Controls.
Step Choose three places where a boundary crosses a data flow and provide a STRIDE analysis.
Step Lastly, summary the proposed controls in a simple bullet list and include it in your solution
Step by Step Solution
There are 3 Steps involved in it
Step: 1
Get Instant Access to Expert-Tailored Solutions
See step-by-step solutions with expert insights and AI powered tools for academic success
Step: 2
Step: 3
Ace Your Homework with AI
Get the answers you need in no time with our AI-driven, step-by-step assistance
Get Started