top of page

Preparing PASTA Today 🍝 Threat Modelling for Real Banking Systems

  • VENUGOPAL PARAMESWARA
  • 1 day ago
  • 9 min read

In this post, we’ll prepare some PASTA—not the edible kind, but the Process for Attack Simulation and Threat Analysis—using a very real, very common banking scenario.


Threat modeling often gets a bad reputation. Too theoretical. Too many diagrams. Too much “security says NOs"


Industry surveys paint an interesting picture. While a strong majority of software organizations say threat modeling is important, far fewer actually do it consistently as part of every project.


While public data rarely breaks this down by industry, banking teams typically sit at the higher end of these averages due to regulatory pressure and fraud risk. However, even in banks, threat modeling is often applied selectively—during major initiatives or audits—rather than as a lightweight, repeatable practice for every feature.


This gap is exactly why lightweight, scenario-driven models like PASTA work so well—especially in fast-moving banking program.


Threat modeling is actually a storytelling exercise—one where we follow a perfectly normal banking feature and ask a simple question:

“What could realistically go wrong here?”

.

The scenario we’ll use throughout

Mobile banking app

A customer:

  1. Logs in

  2. Adds a new beneficiary

  3. Transfers money

This single flow is responsible for:

  • Massive customer convenience

  • Massive fraud losses (when things go wrong)


Let’s walk it through all 7 stages of PASTA.


Step 1: Define the business objectives

Before we worry about boiling water or chopping garlic for my PASTA, we need to answer a simpler question:

  1. Whome are we cooking this dish for?

  2. Do I need to make some adjustments to the key ingredients based someone's allergic reaction or health condition?

  3. How many are there to be fed etc..


If you notice this stage of PASTA is deliberately not talking about threats or security .


From the bank’s point of view, this feature exists to:

  • Increase digital transactions

  • Reduce branch and call-center load

  • Provide a smooth, low-friction customer experience

  • Stay competitive with other banks and fintechs


This framing is crucial and matters.


Because every security control we add later will either support these goals—or quietly fight them!.


Threat modeling works best when we admit that upfront.


Step 2: Define the technical scope


At this stage, we’re not worrying about threats yet — we’re just agreeing on which systems are in our kitchen and which ones aren’t.

Threat modeling fails most often when teams forget this simple rule: we’re not cooking everything in the fridge.


This stage is all about zooming in and getting concrete.


For our simple “add beneficiary + transfer” flow, the scope typically includes:

  • Mobile app (Android / iOS)

  • Backend API layer

  • Authentication service

  • OTP delivery service (SMS / email / push)

  • Core banking system

  • Fraud monitoring engine

  • Logs, alerts, and support tools


Already, this looks less “simple” than the UI suggests.

That’s the first PASTA lesson:

User simplicity is often built on system complexity.


Step 3: Application decomposition

Stage 3 is where we do 'mise en place'. We stop saying “the app adds a beneficiary” and break it into the exact steps and handoffs. Think of it like in cooking — chopping ingredients, moving between stations (chopping board → stove → plating), and noting what ingredients (data) are handled at each point. In banking flows, the most important part isn’t the steps — it’s the handoffs between systems where assumptions and trust creep in.


In technology terms, that is steps, data, components, and trust boundaries.


Lets break down the 'steps' part:


  1. Login / session established

  2. Initiate Add Beneficiary

  3. Enter beneficiary details

  4. OTP / step-up verification

  5. Beneficiary stored + status set (pending/active)

  6. Initiate transfer

  7. Validate limits + risk checks

  8. Execute transfer (core banking)

  9. Notify customer + log event

Lets also list the 'data/ingredients':


  1. Customer ID

  2. Session token

  3. Beneficiary account number / IFSC

  4. OTP / verification result

  5. Transfer amount

  6. Device fingerprint / IP

  7. Risk score / fraud flags


Please note you don't need the whole ingredients for each step.


Pick the only relevant ones from above. You know (or will know) how it affects the taste if you over utilize or under utilise an ingredient in a dish!.


Now lets determine the 'Trust boundaries/handoffs or kichen stations'. The classic trust boundaries are:

  1. Device ↔ API gateway/backend

  2. Backend ↔ OTP provider

  3. Backend ↔ Fraud/risk engine

  4. Backend ↔ Core banking

  5. Backend ↔ Notification channels

  6. Backend ↔ Logs/SIEM/support tools

In cooking there are few high conequence actions like flame on high heat or adding salt or sugar etc

Similarly in applications decomposition there are similar high consequence steps which are high risk / audit critical step

like:

  1. Beneficiary creation

  2. Step-up auth / OTP

  3. Transfer execution

  4. Limit checks / risk decision

  5. Customer notification

  6. Logging / audit trail


So just like our recipe card, you will have to prepare application decomposition card for each high consequence steps:

  • Step: Add beneficiary

  • Station: Mobile app → Backend API

  • Ingredients: session token, beneficiary acct/IFSC

  • Output: “beneficiary add request created”


Key questions we ask:

  • Where does sensitive data first appear?

  • Which system trusts which other system?

  • Where do we assume the user is legitimate?


They say fraudsters or hackers doesn’t break security like encryption or access controls. They simply abuses assumptions between systems.



Step 4: Threat analysis — thinking like an attacker


Stage 4 is where we stop following the recipe and start imagining everything that could go wrong if someone wanted to sabotage the dish.



Kitchen

Banking

Distracted Junior staff

Compromised user session

Saboteur adding salt

Fraudster adding beneficiary

Spoiled ingredient

Malware on device

Recipe thief

API abuser

Sneaky sous-chef

Insider misuse

We walk the recipe and ask: if someone wanted to ruin this dish, where would they intervene?

Threat analysis works best when you do it step-by-step.


Cooking step → Threat question:

  1. Chopping → What if the knife slips?

  2. Boiling → What if the heat is too high?

  3. Plating → What if someone swaps plates?


Banking equivalent:

  1. Add beneficiary → What if this happens from a hijacked session?

  2. OTP → What if it’s intercepted or reused?

  3. Transfer → What if limits are slowly tested and bypassed?


Focus on outcomes attackers want, not technique . No one cares how the sauce is spoiled — only that the dish is inedible.


Let’s meet some realistic attackers:

  • Someone who bought leaked credentials

  • Malware already running on a phone

  • A bot network abusing APIs

  • A low-privilege insider misusing access

Their goals are refreshingly simple:

  • Add their own account as a beneficiary

  • Move money out

  • Avoid detection long enough to repeat it

Walking the flow, we ask uncomfortable questions:

  • Can beneficiary addition happen without re-authentication?

  • Is OTP tied to login only, not to what is being done?

  • Are device, IP, or behavior changes noticed?

  • Can actions be chained quietly over time?

Recipe Step (Flow)

Kitchen Analogy

Threat Scenario

Attacker Intent

User logged in

Chef allowed in kitchen

Compromised session

Act as legitimate user

Add beneficiary

Adding a new ingredient

Fraudulent beneficiary added

Redirect funds

OTP verification

Taste check

OTP intercepted or reused

Bypass validation

Cooling-off period

Letting dish rest

Time-based attack

Avoid detection

Transfer initiation

Serving the dish

Funds transferred in small amounts

Stay below alerts

Risk checks

Head chef approval

Risk engine bypass

Avoid blocks

Notifications

Plating & serving

Alerts delayed or ignored

Buy time

Logs & monitoring

Kitchen CCTV

Logs incomplete

Evade investigation

At this stage, we are not judging design choices.We are just identifying what attackers would love.


Step 5: Vulnerability analysis — where things get easy


In Stage 4, we thought like saboteurs and asked what could go wrong if someone wanted to ruin this dish. But not every kitchen nightmare is possible in every kitchen.


Stage 5 is where we stop imagining and start inspecting. We walk back through our own kitchen and ask a more uncomfortable question: which of these problems does our setup actually make easy?


Threat analysis shows us the dangers. Vulnerability analysis shows us our weaknesses.

In our cooking context:

Threat (Stage 4)

Vulnerability (Stage 5)

Someone adds too much salt

Salt jar is open and unlabelled

Sauce burns

No timer, heat too high

Wrong ingredient added

Ingredients look similar

Dish swapped

No labeling before plating

In our banking context:

Threat

Vulnerability

Beneficiary added fraudulently

No step-up auth for beneficiary creation

OTP abuse

OTP reused across actions

Silent fraud

No velocity checks

Delayed detection

Logs exist


Important observation after your analysis:

These are rarely “bugs”.

They’re trade-offs made for speed, UX, or legacy reasons.

PASTA doesn’t shame these decisions—it surfaces them.


Step 6: Attack modelling — tell the fraud story

If Stage 4 was imagination and Stage 5 was inspection..then Stage 6 is rehearsal.

Attack modelling is not about inventing new problems. It is about chaining the weakneses we already found in exact order someone would exploit them.


In cooking terms:

It is not “the sauce could burn”. But “first the heat is too high, then the timer is missing, then no one notices until it’s too late”


In banking terms, taking fraud without alarm scenerio:

  1. Attacker logs in using compromised credentials

  2. Adds a beneficiary during a low-activity period

  3. OTP is reused / intercepted

  4. Cooling-off period passes without scrutiny

  5. Transfers begin just below alert thresholds

  6. Alerts arrive after funds are gone


No exploits.No zero-days.Just patience and system knowledge.


This is why attack modeling is so powerful. It shows how small, reasonable gaps become big losses when combined.

Step

Action

System Weakness Used

Result

1

Login using stolen creds

Session trust

Attacker is “legitimate”

2

Add beneficiary

No step-up auth

Attacker-controlled account added

3

Complete OTP

OTP reuse window

Verification bypassed

4

Wait

Passive monitoring

No intervention

5

Transfer funds

Threshold-based alerts

Fraud stays invisible

6

Detection

Delayed alerts

Funds already moved

Step 7: Risk and impact analysis

In a real kitchen, this is the moment before the plate leaves the pass.


The chef asks:


  • If this dish goes out as-is, could someone get sick?

  • Would customers complain—or worse, post about it?

  • Would this survive a health inspection?

  • Is this a minor tweak, or should the dish be pulled entirely?


Finally, we step back and speak the language decision-makers understand.

Impact isn’t just:

  • Money lost

It’s also:

  • Regulatory scrutiny

  • Customer trust erosion

  • Incident response costs

  • Brand damage

The payoff of PASTA shows up here:

  • A single control (like step-up auth for new beneficiaries)

  • Can disrupt multiple attack paths

  • With minimal UX impact if designed well

That’s not “security theater”.That’s risk-aware design.


Providing a sample Annualized Loss Exposure using FAIR as a reference




Automating PASTA: from scratch cooking to a pre-heated kitchen



Up to this point, we’ve prepared PASTA the traditional way.


We clarified business objectives.

We decomposed applications carefully.

We walked attack paths step by step.

We quantified impact and debated trade-offs.


That process works — but it’s also time-consuming, skill-intensive, and hard to repeat consistently across every feature, sprint, or team.


In cooking terms, this is the difference between:


  • Making pasta entirely from scratch every single time

  • Versus walking into a pre-heated kitchen with ingredients measured, stations labeled, and timers already set



This is where automating PASTA starts to make sense.




What automation actually means (and what it doesn’t)



Automating PASTA does not mean:


  • Replacing human judgment

  • Auto-generating generic threat lists

  • Turning threat modeling into a checkbox exercise



Instead, it means removing the mechanical effort so teams can focus on decisions that matter.


Think of it like this:


The chef still decides the recipe — the kitchen just makes it easier to cook well every time.



How CreativeCyber automates the hardest parts of PASTA



Without changing the methodology, automation helps where teams usually struggle the most:


1. Business objectives — structured, not vague


Instead of starting from a blank page, teams are guided to:


  • Define business context clearly (customer type, transaction value, regulatory exposure)

  • Attach quantitative impact early (₹ exposure, compliance obligations)

  • Make trade-offs explicit before security controls are discussed


This directly supports Stage 1, where most threat models quietly fail.


2. Application decomposition — without missing critical handoffs


Manually decomposing applications is error-prone:


  • Trust boundaries get skipped

  • “Side systems” like logs and alerts are forgotten

  • High-consequence steps are under-emphasized



Automation helps:


  • Map systems, data flows, and trust boundaries consistently

  • Highlight high-risk and audit-critical steps by default

  • Ensure nothing important falls through the cracks


This reinforces Stage 2 and Stage 3, without turning them into architecture documents.



3. Attack modeling — visual, repeatable, explainable


Instead of free-form narratives, attack paths can be:


  • Modeled explicitly

  • Visualized clearly

  • Replayed and explained to non-security stakeholders


This is especially powerful in Stage 6, where seeing how an attack unfolds changes conversations completely.


4. Countermeasure impact — before you deploy

Perhaps the biggest advantage of automation shows up after analysis.


Rather than asking:

“Will this control help?”

Teams can see:


  • Which attack paths a control breaks

  • How much risk reduction it delivers

  • What residual risk remains after mitigation


This transforms PASTA from analysis into decision support.


The outcome: PASTA becomes repeatable, not rare


When PASTA is automated thoughtfully:


  • It stops being something you do once a year

  • It becomes something you can apply feature by feature

  • It fits naturally into design, build, and review cycles


In cooking terms:


Good kitchens don’t rely on heroic chefs. They rely on good preparation, good tools, and good processes.


After walking through one very ordinary banking feature, a few patterns become clear.


Threat modeling works best when it’s treated as a conversation, not a document that gets written once, reviewed once, and archived forever. The value isn’t in the diagrams themselves — it’s in the questions teams are forced to ask while creating them.


You also don’t need an endless list of scenarios. One well-chosen, realistic flow is often enough to surface the most meaningful risks. When the scenario is grounded in everyday usage, the insights tend to be deeper and far more actionable.


Perhaps most importantly, security is most effective when it is explicitly aligned with business objectives. Controls that support customer experience, operational efficiency, and regulatory goals tend to survive. Controls that fight them quietly get bypassed or eroded over time.


And finally — the most liberating lesson:


You don’t need to model everything. You just need to model something real.

A single feature.

A single flow.

A single honest conversation about how it could fail.


So the next time a feature is being designed, shipped, or reworked, pause for a moment and ask:


“What kind of PASTA are we preparing today?” 🍝

 
 
 
bottom of page