Microsoft Threat and Analysis Modeleling

Microsoft Threat and Analysis

Modeling Tool

Overview

The Microsoft Threat Analysis & Modeling tool allows non-security subject matter experts to enter already known information including business requirements and application architecture which is then used to produce a feature-rich threat model. The Threat Model can automatically identify threats and also produce valuable security features such as:

  • Data access control matrix
  • Component access control matrix
  • Subject-object matrix
  • Data Flow
  • Call Flow
  • Trust Flow
  • Attack Surface
  • Security reports

Advantages

The core function of the Threat Analysis & Modeling tool is to identify threats, while facilitating the process of defining a security strategy. Even if you are not a security subject-matter expert, you have the ability to consistently and objectively identify threats to your software application. Users can assimilate threat models through analytics, visualizations, and reports. The Threat Analysis & Modeling tool automatically generates potential threats to your software application, based solely on known information that you provide. The Threat Analysis & Modeling tool also has the capability to assimilate the information you provide to build security artifacts such as access control matrices, data flow and trust flow diagrams, and focused, customizable reports. An attack library is a collection of attack types along with their relevant vulnerabilities and proposed countermeasures to those vulnerabilities. Attack libraries enable software application teams to define and adopt secure engineering techniques, gain the information necessary to detect security concerns, and create relevant security test cases. Attack libraries provide a way to define, with absolutely minimal permission, the relationship between the exploit (attack), the cause (vulnerability), and the fix (countermeasure). The attack library helps ensure that various development teams understand the security assumptions and dependencies of your application

Disadvantages

Trees generated are huge and cannot be visualized properly using a normal computer monitor. The Modeling tool is not as intuitive to use like the Microsoft SDL tool which uses DFD’s to model components and their interactions.

Downloads

1. Microsoft Threat and Analysis tool v2.1.2

2. Hackmi2 Threat Model

Microsoft SDL logo Microsoft TAM logo SensePost logo