Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

Background of the problem statement: BigMart has a chain of retail stores, selling daily groceries and home requirements across the country. Lately, it has been

Background of the problem statement:

BigMart has a chain of retail stores, selling daily groceries and home requirements across the country. Lately, it has been losing market share to online competitors who are providing a better customer experience than BigMarts brick and mortar establishments. BigMart wants to secure #1 market leader position for daily groceries and home requirements by adopting a digital strategy. The company plans to provide a secure, uninterrupted, and enhanced user experience to its existing and prospective customers. BigMart, Inc., has contracted your organization to perform a threat modeling exercise for its online strategy.

BigMart provides the following requirements:

Customers should be able to search for products and place their orders using the online web store.

Customer needs to create an account prior to placing an order.

Customers can pay with their credit card, debit card, online banking or digital wallet.

Sales team can view customer order details in order to process and deliver it.

Administrators can modify product information.

The requirements study results in the following statements and requirements:

The web store will need to be accessible from the Intranet as well as the Internet.

The web store will need to be designed with a distributed architecture for scalability reasons.

Users will need to authenticate to the web store with the user account credentials which in turn will authenticate to the backend database (deployed internally) via a web services interface.

Credit card processing will be outsourced to a third-party processor.

User interactions with the web store will need to be tracked.

The database will need to backed up periodically to a third-party location for disaster recovery (DR) purposes.

Programming language used is Python and the backend database can be either Oracle or Microsoft SQL Server. The Web Server used is Nginx.

You have been tasked to perform the threat modeling of the application.

Task 1

Before you dive into the process of threat modeling, first identify the business and security objectives. Once the security objectives are identified and understood, you can threat model the software. This includes the following phases with specific activities inside each phase.

Identify Assets

Create Architecture Overview

Decompose Architecture

Identify Threats

Document Threats

Rate Threats

Phase 1 Identify Assets

Task 2

Identify human and non-human actors of the systems

Identify data elements

Identify technologies that will be used to develop the application

Identify external dependencies

Identify threat actors

Phase 2 Create Architecture Overview

Task 3

Create a physical network topology using the following information:

Use Firewall for boundary protection

Use Web application Firewall to protect the application

Use security solutions such as IDS to monitor for malicious traffics

Application server is placed in the DMZ

Database server is placed in the Internal network

Phase 3 Decompose Architecture

Task 4

Create a logical topology using the following information:

Customers use SSL/TLS to access the web store

There is a trust boundary between the web server and application

There is a trust boundary between the application and database

Connection between application is via a secure VPN

Phase 4 Identify Threats

Task 5

Apply the STRIDE model to identify relevant threats (minimum 1 per element). Use OWASP Top 10 list as reference.

Phase 5 Document Threats

Task 6

Use the following threat template for the threats identified in Phase 4.

Threat description

Threat target

Attack techniques

Controls/ Countermeasures

Phase 6 Rate Threats

Task 7

Use the DREAD model to rate each threat. Each element of DREAD can have a threat rating of 1, 2 or 3 (1=Low, 2=Medium, 3=High).

Threat D R E A D Total Rating
Threat 1
Threat 2

Threat Rating

Low Total between 5 and 7

Medium Total between 7 and 10

High Total more than 10

Task 8

Include the threat rating for each threat in the template created in Phase 5.

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Database Design Application Development And Administration

Authors: Michael V. Mannino

3rd Edition

0071107010, 978-0071107013

More Books

Students also viewed these Databases questions

Question

Describe important components of self-regulated learning.

Answered: 1 week ago