14:46:53 RRSAgent has joined #threat-modeling 14:46:57 logging to https://www.w3.org/2024/09/25-threat-modeling-irc 14:46:57 RRSAgent, do not leave 14:46:58 RRSAgent, make logs public 14:46:59 Meeting: Threat Modeling @ W3C 14:46:59 Chair: Simone Onofri 14:46:59 Agenda: https://github.com/w3c/tpac2024-breakouts/issues/12 14:46:59 Zakim has joined #threat-modeling 14:47:00 Zakim, clear agenda 14:47:00 agenda cleared 14:47:00 Zakim, agenda+ Pick a scribe 14:47:01 agendum 1 added 14:47:01 Zakim, agenda+ Reminders: code of conduct, health policies, recorded session policy 14:47:02 agendum 2 added 14:47:02 Zakim, agenda+ Goal of this session 14:47:02 agendum 3 added 14:47:02 Zakim, agenda+ Discussion 14:47:03 agendum 4 added 14:47:03 Zakim, agenda+ Next steps / where discussion continues 14:47:03 agendum 5 added 14:47:03 tpac-breakout-bot has left #threat-modeling 20:01:46 michaelchampion has joined #threat-modeling 21:41:24 simone has joined #threat-modeling 21:44:01 mgarrish has joined #threat-modeling 21:46:56 reillyg has joined #threat-modeling 21:47:06 present+ 21:47:08 scribe+ 21:47:12 present+ 21:47:26 ChrisLilley has joined #threat-modeling 21:47:42 present+ 21:48:12 Slides: https://docs.google.com/presentation/d/1zauMqnZ_e0U3JlNe3bCJacNh9h1VOkBX4_UynjqvQeg/edit#slide=id.g303b479e16d_0_15 21:48:28 slideset https://docs.google.com/presentation/d/1zauMqnZ_e0U3JlNe3bCJacNh9h1VOkBX4_UynjqvQeg/edit 21:48:38 bdekoz has joined #threat-modeling 21:48:54 [slide 1] 21:49:03 Bert has joined #threat-modeling 21:49:13 present+ 21:49:20 maximeg has joined #threat-modeling 21:49:27 simone: Earlier today we were trying to threat model the Digital Credentials API. Here we're going to discuss threat modeling in general. 21:49:42 tzviya8 has joined #threat-modeling 21:49:59 pchampin has joined #threat-modeling 21:50:15 present+ 21:50:16 aykut has joined #threat-modeling 21:50:26 [slide 2] 21:51:03 anusha has joined #threat-modeling 21:51:30 [slide 3] 21:52:21 RRSAgent, draft minutes 21:52:23 I have made the request to generate https://www.w3.org/2024/09/25-threat-modeling-minutes.html reillyg 21:53:24 [slide 4] 21:53:36 [slide 5] 21:54:40 simone: I have a threat of dropping my phone, so I use a rugged cover. I have a thread of shoulder surfing, so I use a privacy screen. 21:54:53 s/thread/threat 21:54:59 s/thread/threat/ 21:55:02 RRSAgent, draft minutes 21:55:03 I have made the request to generate https://www.w3.org/2024/09/25-threat-modeling-minutes.html reillyg 21:55:11 [slide 6] 21:55:51 [slide 7] 21:56:30 [slide 8] 21:58:50 Security and Privacy section*s* 21:59:56 [slide 9] 22:01:44 jojo has joined #threat-modeling 22:01:51 [slide 10] 22:03:42 [slide 11] 22:04:17 [slide 12] 22:06:41 s/Slideset/My slides/ 22:06:46 s/slideset/Slideset/ 22:06:52 [slide 13] 22:07:03 RRSAgent, draft minutes 22:07:04 I have made the request to generate https://www.w3.org/2024/09/25-threat-modeling-minutes.html reillyg 22:07:21 simone: What is the best model? It depends on what we're trying to do! 22:07:49 s/Slideset/My slides/ 22:08:01 [slide 14] 22:08:05 RRSAgent, draft minutes 22:08:06 I have made the request to generate https://www.w3.org/2024/09/25-threat-modeling-minutes.html reillyg 22:08:36 s/Slideset:/Slideset/ 22:08:43 s/My slides/Slideset:/ 22:08:47 RRSAgent, draft minutes 22:08:49 I have made the request to generate https://www.w3.org/2024/09/25-threat-modeling-minutes.html reillyg 22:09:38 [slide 15] 22:09:41 [slide 16] 22:09:55 [slide 17] 22:10:20 [slide 18] 22:10:59 [slide 19] 22:11:34 [slide 20] 22:12:07 [slide 21] 22:12:26 [slide 22] 22:14:06 simone: It can be difficult to switch your mind to the attacker's perspective. 22:14:11 [slide 23] 22:15:24 [slide 24] 22:16:14 [slide 25] 22:19:29 [slide 26] 22:21:37 [slide 27] 22:22:49 ?, you mention authentication. Is authorization rolled into that? 22:23:06 simone: In OSSTTM yes. 22:24:09 ... This was an important question because words may have different meanings for different people. 22:24:28 [slide 28] 22:27:23 [slide 29] 22:28:38 [slide 30] 22:29:36 [slide 31] 22:31:27 [slide 32] 22:32:14 [slide 33] 22:33:30 simone: For example, https://github.com/w3c/security-request/issues/71#issuecomment-2307483632. 22:34:49 [slide 34] 22:34:57 [slide 35] 22:36:22 [slide 36] 22:37:00 denkeni has joined #threat-modeling 22:37:08 [slide 37] 22:37:55 [slide 38] 22:38:56 [slide 39] 22:40:00 ?, how does third party risk from software ecosystems fit into what you've discussed? 22:40:15 ? is Susan 22:42:27 simone: I used to work in threat response. Absolutely (gives recent examples). 22:42:46 ... A threat actor will just ignore your threat model if it allows an attack. 22:43:14 Maxim: Who gets to decide what is out of scope (e.g. malware vs. WebAuthn)? 22:43:56 simone: These are areas where there's ongoing work. 22:44:10 ... Sometimes the mitigation is in a different group, or requires a completely different approach. 22:45:01 ... E.g. Passkeys were design to remove passwords because if you don't have a password it can't be phished. 22:46:50 reillyg: In the malware example. It creates so many other problems that trying to mitigate it in just one place is unhelpful. 22:47:37 RRSAgent, please publish the minutes 22:47:38 I have made the request to generate https://www.w3.org/2024/09/25-threat-modeling-minutes.html reillyg 22:48:43 reillyg has left #threat-modeling