PASTA Threat Modeling for a Sneaker App
OWASP Top 10, PASTA Framework, Threat Modeling, App Security Assessment, Risk Mitigation, Threat Analysis, Vulnerability Analysis
Contents
Scenario
I am part of the growing security team at a company for sneaker enthusiasts and collectors. The business is preparing to launch a mobile app that makes it easy for their customers to buy and sell shoes. I am performing a threat model of the application using the PASTA framework.
Objectives
Go through each of the seven stages of the framework to identify security requirements for the new sneaker company app.
Results
Threat Model
Stages | Information |
---|---|
1. Define business and security objectives | User data is being collected and stored through the app. They want users to feel that data is being protected and kept private. Interaction between buyers and sellers should be easy with zero friction. Proper payment handling is important to avoid legal issues, so compliance with PCI DSS is critical. |
2. Define the technical scope | Technologies used by the app:
|
3. Decompose application | Dataflow diagram1 |
4. Threat analysis | Threats can include:
|
5. Vulnerability analysis | Vulnerabilities can include:
|
6. Attack modeling | Attack tree1 |
7. Risk analysis and impact | Security controls that can reduce risk:
|
1 For the sake of brevity, the data diagram and attack tree have been truncated. In real-world scenarios, these diagrams are much more detailed and complex.