<?xml version="1.0" encoding="utf-8" standalone="yes"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
    <channel>
        <title>STRIDE on Break Lib Site</title>
        <link>https://break.mlibia.xyz/tags/stride/</link>
        <description>Recent content in STRIDE on Break Lib Site</description>
        <generator>Hugo -- gohugo.io</generator>
        <language>en</language>
        <copyright>Lib Copyright</copyright>
        <lastBuildDate>Sun, 22 Feb 2026 00:00:00 +0000</lastBuildDate><atom:link href="https://break.mlibia.xyz/tags/stride/index.xml" rel="self" type="application/rss+xml" /><item>
        <title>Cloud Threat Model</title>
        <link>https://break.mlibia.xyz/p/cloud-threat-model/</link>
        <pubDate>Sun, 22 Feb 2026 00:00:00 +0000</pubDate>
        
        <guid>https://break.mlibia.xyz/p/cloud-threat-model/</guid>
        <description>&lt;h1 id=&#34;cloud-threat-model&#34;&gt;Cloud Threat Model
&lt;/h1&gt;&lt;p&gt;I attended a cybersecurity event 👉&lt;a class=&#34;link&#34; href=&#34;https://containersecurityvillage.kubernetesvillage.com/&#34;  target=&#34;_blank&#34; rel=&#34;noopener&#34;
    &gt;container security village&lt;/a&gt;. I learn this topic &lt;em&gt;Threat Modelling in Cloud&lt;/em&gt; so i want to apply this theory. Some memories :)&lt;/p&gt;
&lt;img src=&#34;https://mochila.laotra.red/apps/files_sharing/publicpreview/d3KdGz7xrWxMwLG?file=/&amp;fileId=5387198&amp;x=1280&amp;y=720&amp;a=true&amp;etag=ecabc18eed4285ca147c5304826da772&#34; alt=&#34;Joined Images&#34; style=&#34;width:100%; max-width:800px;&#34;&gt;
&lt;p&gt;My experiment a static website in an AWS S3 bucket, served via a Content Delivery Network (CDN), with an AWS Lambda backend API. I want to apply threat modeling: shifting security left by finding flaws in the design phase rather than in production.
&lt;/p&gt;
&lt;p&gt;&lt;img src=&#34;https://break.mlibia.xyz/p/cloud-threat-model/demo.png&#34;
	width=&#34;610&#34;
	height=&#34;517&#34;
	srcset=&#34;https://break.mlibia.xyz/p/cloud-threat-model/demo_hu17647159605992948754.png 480w, https://break.mlibia.xyz/p/cloud-threat-model/demo_hu4591506862170095555.png 1024w&#34;
	loading=&#34;lazy&#34;
	
		alt=&#34;demo&#34;
	
	
		class=&#34;gallery-image&#34; 
		data-flex-grow=&#34;117&#34;
		data-flex-basis=&#34;283px&#34;
	
&gt;&lt;/p&gt;
&lt;h2 id=&#34;diagram-showing-components-data-flows-&#34;&gt;Diagram showing Components (Data Flows) ✴️
&lt;/h2&gt;&lt;ul&gt;
&lt;li&gt;Where does secure private data start?&lt;/li&gt;
&lt;/ul&gt;
&lt;div class=&#34;highlight&#34;&gt;&lt;div class=&#34;chroma&#34;&gt;
&lt;table class=&#34;lntable&#34;&gt;&lt;tr&gt;&lt;td class=&#34;lntd&#34;&gt;
&lt;pre tabindex=&#34;0&#34; class=&#34;chroma&#34;&gt;&lt;code&gt;&lt;span class=&#34;lnt&#34;&gt; 1
&lt;/span&gt;&lt;span class=&#34;lnt&#34;&gt; 2
&lt;/span&gt;&lt;span class=&#34;lnt&#34;&gt; 3
&lt;/span&gt;&lt;span class=&#34;lnt&#34;&gt; 4
&lt;/span&gt;&lt;span class=&#34;lnt&#34;&gt; 5
&lt;/span&gt;&lt;span class=&#34;lnt&#34;&gt; 6
&lt;/span&gt;&lt;span class=&#34;lnt&#34;&gt; 7
&lt;/span&gt;&lt;span class=&#34;lnt&#34;&gt; 8
&lt;/span&gt;&lt;span class=&#34;lnt&#34;&gt; 9
&lt;/span&gt;&lt;span class=&#34;lnt&#34;&gt;10
&lt;/span&gt;&lt;span class=&#34;lnt&#34;&gt;11
&lt;/span&gt;&lt;span class=&#34;lnt&#34;&gt;12
&lt;/span&gt;&lt;span class=&#34;lnt&#34;&gt;13
&lt;/span&gt;&lt;span class=&#34;lnt&#34;&gt;14
&lt;/span&gt;&lt;span class=&#34;lnt&#34;&gt;15
&lt;/span&gt;&lt;span class=&#34;lnt&#34;&gt;16
&lt;/span&gt;&lt;span class=&#34;lnt&#34;&gt;17
&lt;/span&gt;&lt;span class=&#34;lnt&#34;&gt;18
&lt;/span&gt;&lt;span class=&#34;lnt&#34;&gt;19
&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;&lt;/td&gt;
&lt;td class=&#34;lntd&#34;&gt;
&lt;pre tabindex=&#34;0&#34; class=&#34;chroma&#34;&gt;&lt;code class=&#34;language-fallback&#34; data-lang=&#34;fallback&#34;&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;Browser / app.py
&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;   AWS WAF 
&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;      │
&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;      ▼
&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;┌─────────────────┐        ┌──────────────────┐
&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;│  API Gateway    │──────▶ │  Lambda (Python) │
&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;│  (HTTP API)     │        │  handler.py      │
&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;└─────────────────┘        └────────┬─────────┘
&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;                                    │ s3:ListBucket
&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;                                    ▼
&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;                           ┌──────────────────┐
&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;                           │    S3 Bucket     │  (private)
&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;                           │  gallery images  │
&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;                           └──────────────────┘
&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;                                    ▲
&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;                           OAC (sigv4)
&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;                                    │
&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;Browser ──────────────────▶ CloudFront CDN
&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;                            (image delivery)
&lt;/span&gt;&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/table&gt;
&lt;/div&gt;
&lt;/div&gt;&lt;h2 id=&#34;phase-2-identify-threats-using-stride-&#34;&gt;Phase 2: Identify Threats (Using STRIDE) 🧐
&lt;/h2&gt;&lt;table&gt;
  &lt;thead&gt;
      &lt;tr&gt;
          &lt;th&gt;Component&lt;/th&gt;
          &lt;th&gt;STRIDE Category&lt;/th&gt;
          &lt;th&gt;Threat Description&lt;/th&gt;
      &lt;/tr&gt;
  &lt;/thead&gt;
  &lt;tbody&gt;
      &lt;tr&gt;
          &lt;td&gt;&lt;strong&gt;S3 Bucket&lt;/strong&gt;&lt;/td&gt;
          &lt;td&gt;Information Disclosure&lt;/td&gt;
          &lt;td&gt;Misconfigured permissions allow unauthorized public read access.&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td&gt;&lt;strong&gt;CDN (CloudFront)&lt;/strong&gt;&lt;/td&gt;
          &lt;td&gt;Spoofing / Tampering&lt;/td&gt;
          &lt;td&gt;Attackers bypass the CDN to target the S3 origin directly.&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td&gt;&lt;strong&gt;API Gateway / Lambda&lt;/strong&gt;&lt;/td&gt;
          &lt;td&gt;Elevation of Privilege&lt;/td&gt;
          &lt;td&gt;Lack of authentication allows unauthorized code execution.&lt;/td&gt;
      &lt;/tr&gt;
  &lt;/tbody&gt;
&lt;/table&gt;
&lt;p&gt;&lt;em&gt;STRIDE methodology (Spoofing, Tampering, Repudiation, Information Disclosure, Denial of Service, Elevation of Privilege) to identify threats at each component.&lt;/em&gt;&lt;/p&gt;
&lt;h2 id=&#34;mitigation-plan-cloud-configuration-fixes&#34;&gt;Mitigation Plan: Cloud configuration fixes.
&lt;/h2&gt;&lt;ul&gt;
&lt;li&gt;&lt;strong&gt;S3:&lt;/strong&gt; Block direct public access and apply CloudFront restriction.&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Lambda:&lt;/strong&gt; Use IAM roles for S3 and Cloudfront access.&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;API Gateway:&lt;/strong&gt; Enable a firewall to block IPs that exceed request limits.&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;CloudFront:&lt;/strong&gt; Apply Amazon CloudFront Origin Access Control (OAC).&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;👉&lt;em&gt;My code&lt;/em&gt;:🔗 &lt;a class=&#34;link&#34; href=&#34;https://github.com/libialany/DevOpsProject/tree/feat/stride&#34;  target=&#34;_blank&#34; rel=&#34;noopener&#34;
    &gt;Results&lt;/a&gt;&lt;/p&gt;
&lt;h2 id=&#34;recommended-tools&#34;&gt;Recommended Tools
&lt;/h2&gt;&lt;ul&gt;
&lt;li&gt;&lt;strong&gt;OWASP Threat Dragon&lt;/strong&gt; (Free, open-source tool)&lt;/li&gt;
&lt;/ul&gt;
&lt;h2 id=&#34;offtopic&#34;&gt;Offtopic
&lt;/h2&gt;&lt;p&gt;&lt;em&gt;Love your dogs by giving them a quality life. Don’t forget to neuter!&lt;/em&gt;&lt;/p&gt;
</description>
        </item>
        
    </channel>
</rss>
