Correlate your threat model to vulnerabilities | Fluid Attacks Help

Correlate your threat model to vulnerabilities

The Design Map section provides you with a correlation between your threat model and the vulnerabilities Fluid Attacks has detected in your system. These threat matches are shown to you irrespective of whether such vulnerabilities have a 'Vulnerable' or 'Safe' status. Thanks to the information in this section, you can prioritize vulnerability remediation strategically, focusing on those flaws that pose the greatest risk to your business as defined by your threat model.

Correlate your threat model on the Fluid Attacks platform

See the threat matches

Role requirement infoRole required: User, Vulnerability Manager or Group Manager
Once Fluid Attacks has analyzed the appropriately formatted file(s) you have provided detailing your threat model, the table in Threat Matches shows you the following information:
  • Threat: The detailed descriptions of threats to your business as provided in your model
  • Correlated vulnerability: The types of vulnerabilities from Fluid Attacks' categorization whose descriptions match those of the threats in your model
  • Note on no threat model correlation
    The value 'No correlation' means that the threat does not match any of Fluid Attacks' defined categories.
  • Category: The names of the categories where Fluid Attacks has included the types of vulnerabilities
  • Severity: The default CVSS scores Fluid Attacks has assigned to the types of vulnerabilities
  • Total vulnerabilities: The total paths in your system where the types of vulnerabilities have been present
  • Note on zero in Total vulnerabilities
    A zero in Total vulnerabilities means that Fluid Attacks has not found vulnerabilities in your system related to the threat in question.
  • Status: Total vulnerabilities by their Status:
    • Safe: Vulnerabilities that are no longer present
    • Vulnerable: Vulnerabilities that are present

Note on threat model
Fluid Attacks applies your threat model to the entire group, not to specific components.

Manage threat model files

Role requirement infoRole required: User, Vulnerability Manager or Group Manager
You need to upload at least one correctly formatted spreadsheet detailing your threat model so that Fluid Attacks can do the correlation with the reported vulnerabilities. The name(s), description(s) and upload date(s) of those resources are shown in the table under Files.

View threat model files on the Fluid Attacks platform

  1. File: The spreadsheet's name
  2. Description: Your team's concise account of the file's content
  3. Date uploaded: When the spreadsheet was added in the platform

Upload threat model files

Notes
File requirements:
  1. The file you upload must be a spreadsheet with the .xlsx or .xls extension. No other kind of file is supported.
  2. Threat descriptions in the spreadsheet must be organized vertically, in the same column(s). Fluid Attacks' analysis takes into account each column with relevant threat descriptions across the sheets in your file.
  3. The file must indeed have threat descriptions. If you, for example, add a spreadsheet that only lists security requirements, the analysis is not performed.
Warning on file requirements
Make sure your files meet the above requirements. Otherwise, you are shown the 'processing' message endlessly.
Advice on threat model
Give the threat-related column an obvious name such as one including the word "threat." 
When you have a spreadsheet with your threat model that is appropriately formatted, you can add it following these steps:
  1. Navigate to Design Map.

  2. Click on the Add/Add file button.

    Find option to upload a threat model on the Fluid Attacks platform

  3. Upload a spreadsheet with the .xlsx or .xls extension and write a brief description of the file's contents (maximum 200 characters).

    Add a threat model on the Fluid Attacks platform

  4. Click on Continue.

When the analysis is done, you can see the results under Threat Matches.

Delete threat model files

Note on file deletion
When you delete a threat model file, threat matches are recalculated using any remaining file.

Follow these steps to delete threat model files:
  1. Navigate to Design Map.

  2. Under Files, select the file(s) using the checkbox(es) and click on the Delete button.

    Delete a threat model on the Fluid Attacks platform

  3. Acknowledge that you understand that once the file is removed, threat matches are recalculated with any files left. Click on the checkbox and then Confirm.

    Delete a threat model file on the Fluid Attacks platform
Free trial message
Free trial
Search for vulnerabilities in your apps for free with Fluid Attacks' automated security testing! Start your 21-day free trial and discover the benefits of the Continuous Hacking Essential plan. If you prefer the Advanced plan, which includes the expertise of Fluid Attacks' hacking team, fill out this contact form.