The Challenge
LogMeIn’s security teams observed that certain types of systems benefit less from traditional threat-modelling workshops. Components that appear simple in purpose, are operated by trusted administrators, or are authored by very experienced engineers can naturally attract a high level of confidence early in the discussion. While this confidence is often well founded, LogMeIn’s approach to security emphasises continuous improvement and the deliberate testing of assumptions.
The challenge, therefore, was to introduce a method that would reliably broaden the discussion beyond initial expectations, without undermining trust, slowing teams down, or placing the burden of analysis on a small number of security specialists.
Requirements for an Effective Approach
Any technique adopted needed to align with LogMeIn’s existing engineering culture and delivery practices. In practice, this meant:
Encouraging active participation from all attendees, including those without deep security expertise
Supporting constructive challenge in a way that felt natural and collaborative
Producing outputs that could be prioritised and integrated into normal engineering workflows
Working efficiently within a focused workshop format
The solution also needed to scale as a repeatable practice rather than a one-off exercise.
The case at LogMeIn: Strengthening a File Distribution Component
One example shared during the talk concerned a component designed to distribute files across customer environments. An administrator would provide a file or a URL, and the system would retrieve that file and distribute it to managed machines. From an operational perspective, the design was clear and purposeful, and the fact that the initiating user already held administrative privileges shaped the team’s initial risk framing.
