Episode 36

Remitly’s Jason Craig on Building a Threat Modeling Strategy

To protect your organization and its valuable assets, you need to know your environment first, especially the pathways through which attackers can access your most valuable assets. On a recent episode of our Detection at Scale podcast, Jason Craig, Director - Threat Detection & Response at Remitly, explained how to start building your threat modeling strategy.

Here are the top takeaways:

  • Start with what your organization does and what has value in your business that an attacker might want. Whether you're a social media company, a fintech company, or a cloud storage company, attackers will be after something: user data, money, abuse of your platform, or something else.
  • Next, identify the pathways that lead to those assets. Create an accurate asset inventory so you have situational awareness of your environment. Then you can visualize the pathways attackers may take to get to your assets — and if valuable assets are just a few hops away from an area of compromise.
  • Determine how you'll safeguard that sensitive data. Choose a hierarchy for protection, starting with the most sensitive data first. Once you have observable data and an understanding of your environment, you can more easily build your detection and response strategies.

Take steps to strengthen identity management as well. There's too much potential for exploit using SMS-based MFA over cellular networks. Instead, use hardware-backed authentication, as well as increase your behavioral profiling to understand the habits of your employees.

Recommended Resources

Escape Cloud Noise. Detect Security Signal.
Request a Demo