My shopping cart
Your cart is currently empty.
Continue ShoppingThe Elevation of Privilege (EoP) card game is designed to introduce developers who are not information security practitioners or experts to the craft of threat modeling. The game uses a variety of techniques to do so in an enticing, supportive and non-threatening way. Threat modelling is the beginning of the process of identifying the work needed to make something more secure.
According to the 2020 DevSecOps report by Gitlab:
"68% of security professionals feel that less than half of developers can spot security vulnerabilities, but most people feel it's a programmer's job to write secure code.
At the same time, nearly 70% of developers said that while they are expected to write secure code, they get little guidance or help. One disgruntled programmer said, "It's a mess, no standardization, most of my work has never had a security scan."
The Elevation of Privilege Card game is an excellent way to bring security into the development process earlier enabling developers to find and fix vulnerabilities in the systems.
The game consists of 74 playing cards which contain cyber security anti-patterns which supports players as they attempt to find validated security flaws in a system. The cards are in six suits based on the STRIDE mnemonic. The EoP card game was invented by Adam Shostack during his tenure at Microsoft. The game was released in 2010. It is a gorgeously produced design at the centre of a gamification of a security checklist, modelled after the game called Spades.
Because the game uses STRIDE threats, it gives you a framework for thinking, and specific actionable examples of those threats. Adam wrote a white paper which explains the objectives and design of the game and his motivations for creating it.
If you would like to gain experience of actually executing this process, with the best possible support, then book your place on our next 'Play to Learn' session.
This is an opportunity to experience, first hand, a game of Elevation of Privilege supported by the games inventor - threat modelling expert Adam Shostack. Working in a small group of just 7 participants, you'll use the game to find threats in a sample system architecture.
Draw a diagram of the system you want to threat model before you deal the cards. Deal the deck to 3-6 players. Play starts with 3 of tampering. Play starts with 3 of tampering. To play a card, each player reads their card, announced the threat and records it. Each round is won by the highest card played in the suit that was led, unless an Elevation of Privilege (EOP) card is played. In that case, the high value EOP card wins.
With teams working remotely all around the world, this guide hopes to provide a framework for facilitators to setup games through video calls using physical cards.
Table header 0 | Name | Description |
---|---|---|
S | Spoofing | Impersonating something or someone else.
|
T | Tampering | Modifying data or code.
|
R | Repudiation | Claiming not to have performed an action.
|
I | Information Disclosure | Exposing information to someone not authorized to see it.
|
D | Denial of Service | Denying or degrading service to users.
|
E | Elevation of Privilege | Gain capabilities without proper authorization.
|
Many of the advantages of the game are cognitive or psychological and we believe that playing the game with physical cards plays to its strengths while playing to human strengths. Online tools are designed to play out over a short period of time. Perhaps an hour or two at the most. The experience of playing remotely with a physical deck is likely to engage players in the subject matter for around a week. If you play more than once per project then engagement with the material could last as long as the project does, or even for years if you have durable teams using the game.
So don't battle to stop devs put insecure systems into production. Draw them in, and have them find faults with their own designs before they leave the whiteboard. Explore the Elevation of Privilege game using Croupier and deliver more secure systems earlier in the development phase.