CompTIA CySA+
1 Threat Management
1-1 Threat Landscape
1-1 1 Identifying Threat Actors
1-1 2 Understanding Threat Vectors
1-1 3 Threat Intelligence Sources
1-1 4 Threat Intelligence Lifecycle
1-2 Threat Hunting
1-2 1 Threat Hunting Concepts
1-2 2 Threat Hunting Techniques
1-2 3 Threat Hunting Tools
1-3 Threat Modeling
1-3 1 Threat Modeling Concepts
1-3 2 Threat Modeling Techniques
1-3 3 Threat Modeling Tools
1-4 Threat Mitigation
1-4 1 Threat Mitigation Strategies
1-4 2 Threat Mitigation Techniques
1-4 3 Threat Mitigation Tools
2 Vulnerability Management
2-1 Vulnerability Identification
2-1 1 Vulnerability Scanning
2-1 2 Vulnerability Assessment
2-1 3 Vulnerability Identification Tools
2-2 Vulnerability Analysis
2-2 1 Vulnerability Analysis Techniques
2-2 2 Vulnerability Analysis Tools
2-3 Vulnerability Prioritization
2-3 1 Vulnerability Prioritization Techniques
2-3 2 Vulnerability Prioritization Tools
2-4 Vulnerability Remediation
2-4 1 Vulnerability Remediation Techniques
2-4 2 Vulnerability Remediation Tools
3 Cyber Incident Response
3-1 Incident Response Planning
3-1 1 Incident Response Plan Development
3-1 2 Incident Response Team Roles
3-1 3 Incident Response Plan Testing
3-2 Incident Detection
3-2 1 Incident Detection Techniques
3-2 2 Incident Detection Tools
3-3 Incident Analysis
3-3 1 Incident Analysis Techniques
3-3 2 Incident Analysis Tools
3-4 Incident Response
3-4 1 Incident Response Techniques
3-4 2 Incident Response Tools
3-5 Incident Recovery
3-5 1 Incident Recovery Techniques
3-5 2 Incident Recovery Tools
4 Security Architecture and Tool Sets
4-1 Security Controls
4-1 1 Security Control Types
4-1 2 Security Control Implementation
4-1 3 Security Control Monitoring
4-2 Security Tools
4-2 1 Security Tool Categories
4-2 2 Security Tool Implementation
4-2 3 Security Tool Monitoring
4-3 Security Architecture
4-3 1 Security Architecture Concepts
4-3 2 Security Architecture Design
4-3 3 Security Architecture Implementation
5 Compliance and Assessment
5-1 Compliance Requirements
5-1 1 Compliance Standards
5-1 2 Compliance Audits
5-1 3 Compliance Reporting
5-2 Assessment Techniques
5-2 1 Assessment Methodologies
5-2 2 Assessment Tools
5-2 3 Assessment Reporting
5-3 Risk Management
5-3 1 Risk Management Concepts
5-3 2 Risk Management Techniques
5-3 3 Risk Management Tools
6 Software Development Security
6-1 Secure Coding Practices
6-1 1 Secure Coding Principles
6-1 2 Secure Coding Techniques
6-1 3 Secure Coding Tools
6-2 Software Development Lifecycle
6-2 1 SDLC Phases
6-2 2 SDLC Security Practices
6-2 3 SDLC Security Tools
6-3 Software Testing
6-3 1 Software Testing Techniques
6-3 2 Software Testing Tools
6-3 3 Software Testing Security
7 Security Operations
7-1 Security Operations Concepts
7-1 1 Security Operations Roles
7-1 2 Security Operations Processes
7-1 3 Security Operations Tools
7-2 Security Monitoring
7-2 1 Security Monitoring Techniques
7-2 2 Security Monitoring Tools
7-3 Security Incident Management
7-3 1 Incident Management Techniques
7-3 2 Incident Management Tools
7-4 Security Awareness Training
7-4 1 Security Awareness Training Concepts
7-4 2 Security Awareness Training Techniques
7-4 3 Security Awareness Training Tools
Threat Modeling

Threat Modeling

Threat modeling is a structured approach to identifying, prioritizing, and mitigating threats to an organization's information systems. It involves analyzing the system's architecture, data flows, and potential vulnerabilities to understand the risks and develop effective security measures.

Key Concepts

1. Asset Identification

Asset identification is the process of listing all critical assets within the system. These assets include data, applications, hardware, and services that need protection. For example, in an e-commerce system, critical assets might include customer data, payment processing systems, and inventory databases.

2. Threat Identification

Threat identification involves enumerating all potential threats that could impact the identified assets. This includes understanding the types of attacks, vulnerabilities, and threat actors. For instance, a threat to customer data might include SQL injection attacks, data breaches, and insider threats.

3. Vulnerability Analysis

Vulnerability analysis examines the system for weaknesses that could be exploited by identified threats. This involves assessing the security controls in place and identifying gaps. For example, a vulnerability analysis might reveal that a web application is not properly validating user input, making it susceptible to SQL injection.

4. Impact Assessment

Impact assessment evaluates the potential consequences of a successful threat exploiting a vulnerability. This helps in prioritizing threats based on their potential impact on the organization. For instance, a data breach impacting customer credit card information would have a high impact due to financial and reputational damage.

5. Mitigation Strategies

Mitigation strategies involve developing and implementing measures to reduce the risk posed by identified threats. This can include technical controls, administrative policies, and physical security measures. For example, implementing multi-factor authentication (MFA) can mitigate the risk of unauthorized access to sensitive data.

Examples and Analogies

Consider a bank as an example of a system that needs threat modeling. The assets include customer accounts, transaction systems, and physical branches. Potential threats might include cyber-attacks to steal money, insider fraud, and physical robberies. Vulnerabilities could be outdated software, weak passwords, and inadequate surveillance. The impact of a successful attack could range from financial loss to loss of customer trust. Mitigation strategies might include regular software updates, strict access controls, and enhanced security cameras.

Threat modeling is akin to building a fortress. You first identify what needs protection (assets), then assess the potential threats (enemies), analyze the weaknesses in your defenses (vulnerabilities), evaluate the consequences of an attack (impact), and finally, fortify your defenses (mitigation strategies) to ensure the safety of your valuables.