Threat modelling for data platforms workshop

As the importance of data for digital business models increases, so do the threats to which this data is exposed. Various types of attackers target data platforms and create a wide range of threats.

Data breaches are probably the best-known danger. New reports of sensitive information being made public are published almost daily. Other risks, such as attacks on the integrity of the data or limiting the availability of the services offered (denial of service), should not be underestimated, however.

Two people are standing in front of a board and looking at symbols that have a lock at the bottom.

Threats to data platforms

The multitude of attack vectors as well as the ever-evolving complex security measures require a systematic approach to thoroughly reviewing the security of the operated data platform.

Akronym STRIDE

 

The STRIDE model, which divides threats into six different classes, is an established method for identifying vulnerabilities.

  • Spoofing refers to when a person or process assumes a false identity, for example due to gaps in authentication.
  • Tampering comprises all vulnerabilities that can lead to data manipulation in the platform or on the network link.
  • Repudiation refers to problems in the traceability and reproducibility of operations on the platform data.
  • Information Disclosure refers to all threats that result in the unauthorised reading or publication of data worthy of protection.
  • Denial of Service attacks compromise or limit the availability of the data platform.
  • Elevation of Privilege includes all vulnerabilities that result in access to data that requires a higher privilege level than the one actually assigned.

Our offer: custom threat modelling for data platforms workshop

Our workshop offers a tailored view of the security situation of your data platform. The aim is to systematically evaluate the threats to and the countermeasures taken for your application. In conjunction with us, you will apply established methods to describe threat scenarios in the context of your own data platform. We consciously focus here on the relevant data and the services involved. Suitable countermeasures are then developed for the identified threats and compared with existing ones.

The result is a prioritised list of problem areas and recommended actions to improve data security on your data platform.

Agenda:

  • Joint classification of data assets at the company

  • Modelling the data flows between the data assets and the services involved

  • Systematic identification of threats to data assets according to STRIDE

  • Elaboration of established countermeasures and discussion of their applicability, derivation of recommendations for action

  • Creation of a roadmap for the implementation of countermeasures and recommended actions

Conduct: The workshop is always moderated by two inovex experts: a data platform engineer experienced in the respective technology and a security specialist with an eye to the threat situation.

Target group: data platform product owners, data architects, data engineers, IT/data security officers

Duration: The workshop is designed for 1–2 days. We can tailor the content and duration of the workshop to your individual needs. A short interview is conducted in advance to prepare and coordinate the workshop.

Technology expertise: on-premise big data clusters (Cloudera/Hortonworks, MapR/HPE Ezmeral), big data on Azure, Amazon Web Services, Google Cloud Platform, ElasticSearch

Get in touch!

Collin Rogowski

Head of inovex Academy