I chose Bank in UK.

Threat Modeling Manifesto Principles:

  1. Understand the System: Thoroughly understand the architecture, components, and dependencies of the bank’s systems.
  2. Identify Threats: Identify potential threats to the confidentiality, integrity, and availability of the bank’s assets.
  3. Mitigate Risks: Develop and execute security measures to avoid the identified risks.
  4. Iterate: revise and update the threat model on a regular basis to familiarize to evolving threats and changes in the system.

    OWASP Threat Modeling Cookbook Approach:

  5. Define System Scope: Include all components of the bank’s infrastructure, including networks, servers, applications, and data stores.
  6. Decompose the System: decompose the system under assessment into smaller components to understand their interactions and potential vulnerabilities.
  7. Categorize Assets: Classify critical assets such as financial transactions and client data
  8. Enumerate Threats: Consider threats such as unauthorized access, insider threats, data breaches, malware attacks, and denial of service.
  9. Rate Risks: Assess the likelihood and impact of each threat to prioritize mitigation efforts.
  10. Mitigation Strategies: Implement security procedures; for instance intrusion detection systems, access controls, encryption, and regular security assessments.
  11. Validate the Model: Test the effectiveness of the threat model through penetration testing, vulnerability scanning, and red team exercises.

    MITRE ATT&CK Framework:

  12. Tactics and Techniques: understand common tactics and techniques used by adversaries, such as Credential Access or Privilege Escalation
  13. Adversary Behavior: Identify potential adversary behaviors such as credential theft, lateral movement, and data exfiltration.
  14. Mapping to Controls: Map identified threats to relevant security controls and countermeasures.
  15. Detect and Respond: Develop detection and response capabilities to identify and mitigate adversarial activity.