Shostack + Friends Blog

 

Appsec Roundup - August 2024

The most important stories around threat modeling, appsec and secure by design for August, 2024. a photograph of a robot, sitting in a library, working on a jigsaw puzzle

Threat Modeling

Appsec

  • Crowdstrike released what they call an RCA. Before they did, I said I’d judge it based on clarity, depth and scope, and it fails on all three. There’s no “five whys”, there’s no discussion of management choices or funding. Rushing root cause work gets you shallow analyses and you get shallow improvement.
  • Narrowing the Software Supply Chain Attack Vectors: The SSDF Is Wonderful but not Enough by Laurie Williams (from March, but I’d missed it).
  • Simon Tatham lists Code review antipatterns, none of which specifically mention security, but code reviews are often associated with security, and the “Late breaking design review” pattern certainly ties into threat modeling either done or communicated badly.

AI

  • Mike Privette released an AI AI Security Shared Responsibility Model. I’m sad that it excludes “AI-enabled products,” but happy the exclusion is explicit.
  • Google Deepmind released a paper and post, Mapping the misuse of generative AI. Interesting taxonomy, I’m skeptical that ‘analyzing media reports’ is the right path to a frequency count, and it’s tempting to say that lacking AI incident reporting and a Bureau of Cyber Public Health, it’s all we can reasonably get? I have a list of incident databases in my lessons learned resource page.

Shostack + Associates updates

  • Adam will be keynoting ThreatModCon San Francisco (Sept 28-29), immediately after OWASP Global Appsec... and we’ll have our first ever trade show booth! We hope to see you there.
  • Also, our fall is filling up with training deliveries, so if you’re considering doing something, now is a great time to get on the schedule.
  • Lastly, each year large companies come to us wanting to spend budget by the end of the year. We usually make it work, but contracting often leads to delays. We’ve had customers for whom that phase takes 90 days or longer, and so if you think you’d like to invest in threat modeling training, why not reach out and get started?

Image by Midjourney: “a photograph of a robot, sitting in a library, working on a jigsaw puzzle”