02. Threat Modeling

‘Classic’ plan-based process:

Secure development lifecycle (SDLC):

It is wrong to assume that if you can’t measure it, you can’t manage it - a costly myth

W. Edwards Deming

e.g. how well-trained are users in detecting phishing attempts? Even if you can’t measure it, you can still implement training.

Security assessment:

Architecture:

Modelling data flows:

                                       Trusted Space
                                     |
                         _____       
---------    data      /       \     | sanitized     ----------
| Actor |  ------->   | Process | ----------------->  Database
---------              \       /     |   data        ----------
                         -----  
                                     |
Element Spoof. Tamper. Repudiat. Info. Discl. DoS Priv. Elev.
Data flow x x x
Store x x x
Process x x x x x x
Actor x x

Software detailed design:

Development and coding:

Release and deployment:

OWASP Threat Modeling Process:

Uber Eats Scenario: