Threat Modeling Practices and Secure Design

After discussing security architecture and design principles, we will now introduce threat modeling security practices and tools. The adoption of threat modeling practices can help to reduce major security risks in the design phase. In addition, once the risks are identified, we will introduce how to apply OWASP secure design best practices to mitigate security risks.

The topics to be covered in this chapter are the following:

  • Threat modeling practices
  • Threat modeling with STRIDE
  • Diagram designer tool
  • Card game
  • Threat library references
  • Case study: formal documents or not?
  • Secure design

Get Hands-On Security in DevOps now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.