Apply the STRIDE Model: Use Microsoft’s STRIDE framework to systematically identify threats
Understand Threat Taxonomies: Navigate comprehensive IoT threat classification systems
Map Threats to Security Properties: Connect STRIDE categories to CIA triad violations
Model Attack Scenarios: Build attack trees showing step-by-step compromise paths
Identify Entry Points: Map all attack surfaces across IoT system architecture
In 60 Seconds
STRIDE is a systematic threat classification framework that ensures comprehensive coverage of security threats by categorising every potential attack as Spoofing, Tampering, Repudiation, Information Disclosure, Denial of Service, or Elevation of Privilege — applied to each component, data flow, and trust boundary in an IoT system diagram. Its power is that it turns threat identification from a creative brainstorming exercise into a structured checklist that reliably surfaces threats that would otherwise be overlooked.
What is STRIDE? STRIDE is Microsoft’s threat modeling framework that helps you systematically identify six types of security threats: Spoofing (fake identity), Tampering (data modification), Repudiation (denying actions), Information disclosure (data leaks), Denial of service (making systems unavailable), and Elevation of privilege (gaining unauthorized access).
Why does it matter? STRIDE provides a checklist to ensure you don’t miss common vulnerability classes. Instead of guessing what might go wrong, you systematically ask: “Can an attacker spoof identity here? Can they tamper with data? Can they deny they did something?” This structured approach catches threats that ad-hoc brainstorming misses.
Sensor Squad: The Six-Question Security Check!
“STRIDE is my favorite security tool!” Max the Microcontroller said. “It gives us six questions to ask about every part of our system. Think of it as a six-point inspection, like when a mechanic checks your car.”
Sammy the Sensor listed them out. “S is for Spoofing – can someone pretend to be me and send fake sensor data? T is for Tampering – can someone change my readings while they travel across the network? R is for Repudiation – can someone do something bad and then deny they did it because there are no logs?”
Lila the LED continued. “I is for Information disclosure – can someone eavesdrop on private data? D is for Denial of service – can someone flood me with so many requests that I crash and real users cannot get through? E is for Elevation of privilege – can a regular user somehow get administrator access?”
“The magic of STRIDE is that it maps perfectly to security defenses,” Bella the Battery concluded. “Spoofing? Fix it with authentication. Tampering? Fix it with integrity checks. Repudiation? Fix it with logging. Information disclosure? Fix it with encryption. Denial of service? Fix it with rate limiting. Elevation of privilege? Fix it with authorization. Six problems, six solutions – it is beautifully organized!”
Key terms: | Term | Maps To | IoT Example | |——|———|————-| | Spoofing | Authentication | Attacker sends fake sensor data pretending to be legitimate device | | Tampering | Integrity | Attacker modifies firmware to inject malware | | Repudiation | Non-repudiation | Malicious user deletes audit logs to hide their actions | | Information Disclosure | Confidentiality | Attacker intercepts unencrypted Wi-Fi to steal passwords | | Denial of Service | Availability | Botnet floods IoT gateway with traffic, making it unresponsive | | Elevation of Privilege | Authorization | Attacker exploits firmware bug to gain root access |
MVU: STRIDE Threat Modeling
Core Concept: STRIDE systematically identifies six threat categories (Spoofing, Tampering, Repudiation, Information disclosure, Denial of service, Elevation of privilege) by asking what can go wrong at each component and trust boundary. Why It Matters: Ad-hoc threat analysis misses vulnerability classes; STRIDE’s structured checklist catches 95% of common IoT security flaws. Key Takeaway: Apply STRIDE at every trust boundary (device→gateway, gateway→cloud, user→app) to systematically uncover attack vectors.
13.2 Introduction
Effective security requires systematic threat identification. While ad-hoc brainstorming might catch obvious vulnerabilities, it consistently misses entire classes of threats. Microsoft’s STRIDE framework provides a structured methodology to ensure comprehensive coverage across all threat categories.
This chapter introduces STRIDE and complementary threat taxonomies from ENISA, OWASP, and the Open Threat Taxonomy. You’ll learn how to apply STRIDE at IoT system trust boundaries, map threats to security properties, and quantify risk using the DREAD scoring system. The chapter culminates in a complete worked example analyzing a smart water meter deployment across four trust boundaries.
By mastering these frameworks, you’ll transform from reactive security patching to proactive threat modeling that identifies vulnerabilities before attackers exploit them.
13.3 Threat Modelling Process
⏱️ ~15 min | ⭐⭐ Intermediate | 📋 P11.C05.U02
Key Concepts
Spoofing: Impersonating another device, user, or service to gain illegitimate access — mitigated by strong authentication (certificates, challenge-response) and anti-replay mechanisms.
Tampering: Unauthorised modification of data in transit or at rest — mitigated by cryptographic integrity protection (HMAC, digital signatures, TLS) and access control.
Repudiation: The ability to deny performing an action, making accountability impossible — mitigated by comprehensive, tamper-resistant audit logging and digital signatures on actions.
Information Disclosure: Unauthorised exposure of sensitive data (credentials, sensor readings, personal information) — mitigated by encryption at rest and in transit, access control, and data minimisation.
Denial of Service: Attacks preventing legitimate use of the IoT system by exhausting resources or disrupting communications — mitigated by rate limiting, resource quotas, and resilient network design.
Elevation of Privilege: An attacker gaining higher-level access than authorised — mitigated by least-privilege design, privilege separation, and input validation to prevent code execution vulnerabilities.
Threat Modelling: Structured analysis of system vulnerabilities from an attacker’s perspective to identify risks, quantify likelihood and severity, and prioritize mitigation mechanisms.
How It Works: Applying STRIDE to IoT Trust Boundaries
STRIDE threat modeling systematically analyzes security at trust boundaries where different security contexts meet:
The threat landscape visualization helps security teams understand the breadth of potential attack vectors and prioritize defensive investments based on organizational risk profiles.
Application exploitation (code injection, reverse engineering, API abuse)
Severity Rating: Each threat rated 1-5 based on likelihood and impact.
13.4.3 ENISA IoT Threat Taxonomy
Figure 13.14: ENISA IoT threat taxonomy part 1
Figure 13.15: ENISA IoT threat taxonomy part 2
Figure 13.16: ENISA IoT threat taxonomy part 3
European Union Agency for Cybersecurity (ENISA) provides IoT-specific threat taxonomy.
ENISA IoT threat framework classification
Figure 13.17: ENISA IoT Framework: Assets, Threats, and Vulnerabilities Classification
13.4.4 IoT Threat Taxonomy: A Structured View
Understanding threats requires systematic categorization across the entire IoT stack. The following mindmap provides a comprehensive view of threats organized by layer:
Each component in an IoT system presents unique vulnerabilities that attackers can exploit:
Component
Primary Threats
Impact
Mitigation Priority
Sensors
Spoofing, tampering
Data integrity
Medium
MCU/SoC
Side-channel, fault injection
Complete compromise
High
Radio
Eavesdropping, jamming
Availability, privacy
High
Gateway
MITM, privilege escalation
Network pivot
Critical
Cloud API
Injection, auth bypass
Mass compromise
Critical
Mobile App
Reverse engineering, credential theft
Account takeover
High
Critical Insight: The Weakest Link
IoT security is only as strong as the weakest component. A secure cloud API is worthless if device firmware accepts unsigned updates. Defense in depth requires securing every layer.
13.5 Worked Example: STRIDE Analysis of a Smart Water Meter System
Scenario: A water utility deploys 50,000 smart meters communicating via LoRaWAN to 200 gateways, which forward usage data to a cloud billing platform via HTTPS. Each meter reports hourly consumption (4-byte reading + 8-byte timestamp + 2-byte meter ID). Apply STRIDE to identify threats at each trust boundary.
Trust Boundaries Identified:
Meter-to-Gateway (LoRaWAN, 868 MHz)
Gateway-to-Cloud (HTTPS over 4G)
Cloud API-to-Billing System (internal REST)
Billing System-to-Customer Portal (HTTPS)
STRIDE Analysis at Trust Boundary 1: Meter-to-Gateway
STRIDE Category
Specific Threat
Severity
Mitigation
Spoofing
Attacker clones a meter’s DevEUI and AppKey to inject false readings
HIGH
LoRaWAN 1.1 join server with per-device root keys; hardware secure element stores AppKey
Tampering
Attacker modifies meter reading in transit (e.g., reduces water usage to lower bill)
HIGH
LoRaWAN MIC (Message Integrity Code) using AES-128-CMAC; any modification invalidates 4-byte MIC
Repudiation
Customer claims meter reading was forged by utility
MEDIUM
Server-side log with MIC verification proof; tamper-evident meter seal with photo documentation
Info Disclosure
Attacker eavesdrops on consumption patterns to determine occupancy
MEDIUM
LoRaWAN AppSKey encryption (AES-128-CTR); attacker sees encrypted payload only
Denial of Service
Attacker jams 868 MHz band near gateway, blocking 250 meters
HIGH
Redundant gateways with overlapping coverage; ADR (Adaptive Data Rate) to increase power
Elevation of Privilege
Compromised meter sends administrative commands to gateway
LOW
LoRaWAN Class A devices are receive-only during RX windows; meters cannot initiate commands
Quantified Risk: Spoofing Attack Economics
Attack cost to clone one meter:
SDR hardware (HackRF One): $300
Capture join request: 1 hour monitoring
Brute-force 128-bit AppKey: Infeasible (2^128 operations)
Alternative: Extract AppKey from physical meter: $50 (JTAG probe)
Total attack cost per meter: $350
Impact of successful spoofing:
Average water bill: $60/month
Maximum billing fraud per meter: $720/year
Payback period for attacker: 6 months (for single meter)
Mitigation cost:
Hardware secure element (ATECC608B): $0.65/meter
50,000 meters: $32,500 total
Makes AppKey extraction infeasible (hardware tamper protection)
ROI calculation:
If 1% of meters were compromised: 500 meters × $720/year = $360,000/year
If 10% were compromised: 5,000 meters × $720/year = $3.6M/year
$32,500 investment prevents potential multi-million dollar fraud
Key Finding: The STRIDE analysis reveals that Denial of Service (gateway jamming) is the highest-impact threat because it affects 250 meters per gateway, while Spoofing has the highest fraud potential but requires physical access. The Elevation of Privilege risk is inherently low due to LoRaWAN’s asymmetric architecture where meters cannot send administrative commands.
Concept Relationships
Concept
Relates To
Nature of Relationship
STRIDE Categories
Security Properties
Each STRIDE threat violates specific security principle
Trust Boundaries
Attack Surface
Boundaries mark security context transitions
ENISA Taxonomy
STRIDE Mapping
Both frameworks classify threats but at different granularities
Attack Trees
Threat Decomposition
Trees show step-by-step paths to achieve STRIDE goals
Threat Modeling
Defense in Depth
Systematic threat ID informs layered protection design
IoT Attack Surfaces
Component Analysis
Each system layer (device, network, cloud) has distinct threats
Step 3: Analyze threat distribution - Total threats identified: 35 - Theoretical maximum (4 boundaries × 6 categories): 24 - The 35 threats exceed the theoretical maximum because some threats span multiple boundaries (e.g., a DoS attack can affect both meter→gateway and gateway→cloud) - This overlap is expected in real systems where threats cascade across trust boundaries
Result: Information Disclosure mitigations provide highest risk reduction per dollar invested (57.2 / $2,000 = 0.029 vs Spoofing 36.7 / $8,000 = 0.0046).
In practice: STRIDE’s orthogonality ensures no threat category is missed. The 6-category framework maps to exactly 6 security properties, making it provably complete for security analysis.
Match: STRIDE Threats to Violated Security Properties
Order: STRIDE Analysis at a Trust Boundary
13.7 What’s Next
If you want to…
Read this
Apply STRIDE in depth to IoT system threat modelling
1. Applying STRIDE only to devices and not to data flows
STRIDE threats arise at both components (devices, services) and data flows (communications between components). Applying STRIDE only to devices misses threats like man-in-the-middle (Tampering/Information Disclosure on data flows) and replay attacks (Spoofing on authentication flows).
2. Stopping at threat identification without selecting mitigations
STRIDE analysis produces a list of threats; its value is only realised when each identified threat is paired with specific mitigations and tracked through implementation. A threat list without mitigations is a vulnerability inventory, not a security plan.
3. Applying the same STRIDE template without adapting to the specific system
Generic STRIDE templates list ‘potential spoofing on device authentication’ as a threat for every system. The value of STRIDE comes from specificity: ‘an attacker who can observe MQTT traffic can replay device credentials because the broker does not implement challenge-response authentication’.
4. Performing STRIDE in isolation rather than as a collaborative exercise
STRIDE analysis conducted by a single security engineer misses domain knowledge held by firmware developers, network engineers, and field operators. STRIDE is most effective as a facilitated group exercise with diverse participants.
Label the Diagram
💻 Code Challenge
13.8 Summary
This chapter covered systematic threat identification using STRIDE and comprehensive threat taxonomies:
STRIDE Framework: Six threat categories that map to security properties - Spoofing attacks authentication - Tampering attacks integrity - Repudiation attacks non-repudiation - Information Disclosure attacks confidentiality - Denial of Service attacks availability - Elevation of Privilege attacks authorization
Threat Modeling Process: Five-step systematic analysis 1. Architecture knowledge (components, protocols, data flows) 2. Entry points (physical, network, application interfaces) 3. Data flow paths (where data is encrypted, authenticated) 4. Trust boundaries (device, gateway, cloud, user interfaces) 5. Attack scenarios (opportunistic and targeted threats)
Key Insight: IoT security is only as strong as the weakest link. A secure cloud API is worthless if device firmware accepts unsigned updates. Defense in depth requires securing every layer.
Continue to Attack Scenarios to see how these theoretical threats manifest in real-world IoT breaches.