What is the STRIDE Model?

What is the STRIDE Model?

The STRIDE model stands for Spoofing, Tampering, Repudiation, Information disclosure, Denial of Service, and Elevation of Privilege. This is a method that can be used to evaluate a system that you currently have in place or a system that you would like to implement in your organization.

As we have previously discussed data is the current currency of the world. To better protect your data it is important that you understand what your data is doing, where is it, and how it is being moved throughout your systems. You can use the STRIDE model to help you look at each portion of your system to determine if you are in the best security posture.

Spoofing is when an attacker tries to disguise a form of communication to get your users to disclose information or credentials. If your system has a connection to the internet through email, text, or video messaging this is where you would want to think about the S in the STRIDE model. What policies, and procedures do you have in place at that entry/exit point to better protect your users? This could email detection policies, spam policies, and a quarantine process that if communication is seen as malicious it will be quarantined to prevent the possibility of a user clicking on the attachment or link.

Tampering is when an attacker alters the original data in some way. If you are looking at your system think about when your data is at rest. Many times once you put something in a storage area you do not think about it, and this could be a big mistake. It is important that you have processes in place that check to make sure that if there is data that is at rest it is being checked to ensure that there is no tampering with that data.

Repudiation is making sure there are ways to prevent someone from being able to say that they adjusted the data in any way. Repudiation is the part of the STRIDE model that many people who are creating systems sometimes forget. Not because it is not an important part, but because they always make sure that they have logged in place in their environment. Logging is great don't get me wrong, but what good is a log if you never have a system in place to analyze and look at the logs? This could be a great place in your environment for an AI system that takes log information creates a heuristic profile of that particular type of log and monitors the logs as they come in, when there is something that seems off then an alert is triggered.

Information disclosure is what many people when they are creating a system or adjusting a system tend to try to prevent. It is making sure that you can't just download information that should be protected in plain text. You will see this through the encryption of data, limiting the amount of data that can be downloaded at a time, and even RBAC rules that prevent users who should not have access to information from accessing it in the first place. This will give you a chance to look at your system and ask the question where is my data flowing throughout this system, is it necessary, should it be going there, and who has the permission to send it to that location?

Denial of Service is where you prevent traffic to a device or network resource. When looking at your system it is bested to see where these points in your system are and put policies and procedures in place that if an influx of packets is detected it will adjust the firewall settings to prevent access to the source address.

Finally, you have elevation of privilege which is when an attacker gains access to a lower account and exploits the system weaknesses to gain high or administrative access. Consider in your system diagram at this point where could an attacker use the tools that are available to perform a privilege escalation, and how do I stop this possibility,

There is no way for a system to be 100% secure but if you take your system and really look at it through the lens of the STRDE model you will have tackled the most common and likely ways an attacker will try to get into your system



To view or add a comment, sign in

More articles by Darlisha Campbell

  • Have you considered technology diversity?

    Have you considered technology diversity?

    Organization can utilize the start of a fiscal year to implement changes that will help with their security posture…

  • Do your research!

    Do your research!

    Knowledge is one of the most powerful tools that any person who is interested in being in cybersecurity must learn to…

    2 Comments
  • 10 phases of a Nmap scan

    10 phases of a Nmap scan

    The second stage of ethical hacking of scanning/enummeration is one of the more important stages. Understanding the…

    1 Comment
  • The Story of HTTP Responses

    The Story of HTTP Responses

    Web application testing allows a tester to identify potential security risks in web applications. When using tools like…

  • 5 Stages of Ethical Hacking

    5 Stages of Ethical Hacking

    Data is one of the new currencies of the world, meaning the goal of many malicious hackers is to gain access to as much…

  • Are IoT devices a security risk?

    Are IoT devices a security risk?

    In the world of IoT(Internet of Things) devices it is common for security to take the back seat. IoT brings the luxury…

  • The World of Microsoft Copilot: Friend or Foe?

    The World of Microsoft Copilot: Friend or Foe?

    Microsoft Copilot has gone general availability as of November 1st of this year. There are multiple different flavors…

    1 Comment
  • Permission vs Access: Battle of the words

    Permission vs Access: Battle of the words

    In this age of the cloud, it has come to my attention that there is a difference between the words permission and…

  • Who is AvosLocker?

    Who is AvosLocker?

    AvosLocker is a Ransomware as a Service(Raas) affiliate-based group that hands the ransom negotiations and publishing…

  • The Rise of Social Engineering

    The Rise of Social Engineering

    Social engineering is one of the major conversation starters when we are talking about how attackers gain information…

Insights from the community

Others also viewed

Explore topics