none
Modeling a data flow between a process and a file with Threat Modeling Tool 2014 RRS feed

  • Question

  • What is the best way to model a data flow in Threat Modeling Tool 2014 between a process and a file on the local filesystem?  - for example, a process reading an application configuration file on the local filesystem.

    The Flow stencils seem to be designed for data flows over the network - for example, the Generic Data Flow's Physical Network property implies that the data is flowing over the network, and all Flows have this property.  The Threat Modeling Tool 2014 then generates threats such as "Spoofing of Destination Data Store AppConfig File", for example, which are inappropriate for a file system operation. (Of course, it generated this threat in part because I left the Source/Destination Authenticated properties as the default value of No, as these properties also don't make sense for a file system operation.)

    I can mark the "Spoofing of Destination Data Store AppConfig File" threat as Not Applicable, which is fine.  But does anyone have a better way to model a data flow such as the one described?

    Thanks,

    Tuesday, May 13, 2014 7:56 PM