Third party cookies may be stored when visiting this site. Please see the cookie information.

Penguin Fortress YouTube Channel

Cybersecurity STRIDE analysis of a Raspberry Pi IoT project

In my earlier video I explained the concept of Threat analysis and the STRIDE threat classification scheme. In that video I looked at the theory, but in this video I explain how it can be used in a real example using an Internet of Things (IoT) project using a Raspberry Pi computer.

This is simplified but should help show how you turn the theory into practice.

Transcript: Cybersecurity STRIDE analysis of a Raspberry Pi IoT project - Video Transcript

This is also one of the key learning points in CISSP section 1.

The example project used is my Raspberry Pi Pixel Server.This IoT project started life as a non-secure application designed for use on a secure network, but as I wanted to make it suitable for connecting to the Internet I decided I needed to implement the CIA triad and the AAA security framework. This also meant that I should perform cybersecurity threat analysis to ensure that the application is secure before connecting it to the Internet.

Raspberry Pi IoT Pixel Server project

The 6 steps to STRIDE are:

  • Spoofing - imitating someone or something else to gain access to a system or higher privilage
  • Tampering - unauthorized changes to data or configuration
  • Repudiation - identifying who has done what on the system
  • Information Disclosure - unathorized access to information that is confidential or secret
  • Denial of Service DoS - preventing access to a service
  • Elevation of privilege - increasing the level of privilege after logging in as less priveleged user

Data Flow Diagrams

Below are the data flow diagrams that I used. These are to focus on just two aspects, the network connectivity and the internal storage of usernames.

This diagram is based on the network data flows. The central part is a web server, which is an nginx web server. In this instance it's primarily acting as a reverse proxy adding SSL/TLS encryption to data being passed over the Internet. The requests from the user arrive as https to the reverse proxy, which are then passed to the web application (Python Flask web app) as http. The web application responds back to the reverse proxy, which sends the response back to the human user as encrypted SSL/TLS HTTPS.

Raspberry Pi IoT Pixel Server project network data flow diagram

This diagram shows the local data flow between the web application and the local file system which is used to store the hashed user passwords.

Raspberry Pi IoT Pixel Server project data flow diagram file system access for password storage

STRIDE Threat Analysis

Based on the above diagrams I performed STRIDE threat analysis by looking for threats against each of the 6 STRIDE categories.

Analysis was performed using the Microsoft Threat Analysis Tool, but also using manual means looking at possible threats where data flows from one component to another.

Some of the threats identified are listed below.

HTTP

  • Replay Attacks (Tampering)
  • Collision Attacks (Tampering)
  • Cross Site Scripting (Tampering)
  • Weak Authentication (Information Disclosure)
  • Elevation Using Impersonation (Elevation of Privilege)

HTTPS

  • Data repudiation
  • Cross Site Scripting
  • Elevation Using Impersonation
  • Potential process crash (DoS)
  • Data flow is interrupted (DoS)
  • Remote Code Execution (elevation of privilege)
  • Cross-site request forgery (elevation of privilege)
  • Spoofing Human User Destination (spoofing)
  • Human denies receiving data (repudiation)

File System

  • Weak Credential Storage (Information Disclosure)
  • Potential Excessive Resource Consumption (Denial of Service)
  • Weak Access Control for a Resource (Information Disclosure)

Classification of Threats and Mitigation Steps

The next step is to assess those threats, prioritize and respond to the threats. This is used to identify and allocate resources to mitigating the threats. There are different ways that the risk can be assessed such as probability vs damage; high / medium / low risk; a heatmap or the DREAD system.

Based on this I identified the following four as the main threats to address (this is only a partial list, some of the other threats had already been addressed and others were considered at a later stage):

  • Cross Site Scripting
  • Weak Authentication
  • Weak Credential Storage
  • Weak Access Control for a Resource

Summary

As a summary the STRIDE threat analysis has provided a way to identify risks and work out steps to mitigate the risks. There are other threat analysis methodologies that can be used, but this is useful for identifying threats that could otherwise be missed.

This analysis can be performed using the Microsoft Threat Analysis Tool or manually.

More information

Please subscribe to Penguin Fortress on YouTube for future videos.

For more details about how security see the following guides:

Previous STRIDE Model
STRIDE Model
Next IT General Controls (ITGC)
IT General Controls (ITGC)