Reader small image

You're reading from  Implementing DevSecOps Practices

Product typeBook
Published inDec 2023
PublisherPackt
ISBN-139781803231495
Edition1st Edition
Right arrow
Author (1)
Vandana Verma Sehgal
Vandana Verma Sehgal
author image
Vandana Verma Sehgal

Vandana Verma Sehgal is a seasoned cybersecurity professional with over 17 years of experience, specializes in DevSecOps, and has a diverse background in Vulnerability management, SOC, Infrastructure, Application, and Cloud Security. She is a speaker and trainer, having presented at events like Global OWASP AppSec, BlackHat, and Grace Hopper. Vandana actively contributes to the cybersecurity community as a member of the OWASP Global Board of Directors, and Black Hat Asia Review Board and is deeply involved in diversity initiatives like InfosecGirls, WoSec, and null. She has earned numerous awards, including Cyber Security Woman of the Year 2020 and Application Security Influencer 2020 in India. Her passion for diversity and inclusion drives initiatives like InfosecGirls, WoSec, and InfosecKids, inspiring and empowering the next generation of security professionals.
Read more about Vandana Verma Sehgal

Right arrow

Threat modeling techniques

Threat modeling is the process of identifying, understanding, and addressing threats in a given system, application, or environment. It’s a key component of secure design and the SDLC. Here’s an overview of the primary threat modeling techniques:

Brainstorming:

  • This is an informal technique where a group of stakeholders, ideally with diverse expertise, come together to discuss and identify potential threats to a system
  • Strengths: Flexible; can produce creative and unexpected insights
  • Limitations: As it is informal, it might miss certain threats or be biased based on the participants’ knowledge

Attack trees:

  • A hierarchical model that outlines potential attacks on a system
  • Starts with a root, which is the ultimate goal of the attacker, branching down into various means to achieve that goal
  • Strengths: Provides a visual and systematic way to identify potential attacks
  • Limitations: Can become complex...
lock icon
The rest of the page is locked
Previous PageNext Page
You have been reading a chapter from
Implementing DevSecOps Practices
Published in: Dec 2023Publisher: PacktISBN-13: 9781803231495

Author (1)

author image
Vandana Verma Sehgal

Vandana Verma Sehgal is a seasoned cybersecurity professional with over 17 years of experience, specializes in DevSecOps, and has a diverse background in Vulnerability management, SOC, Infrastructure, Application, and Cloud Security. She is a speaker and trainer, having presented at events like Global OWASP AppSec, BlackHat, and Grace Hopper. Vandana actively contributes to the cybersecurity community as a member of the OWASP Global Board of Directors, and Black Hat Asia Review Board and is deeply involved in diversity initiatives like InfosecGirls, WoSec, and null. She has earned numerous awards, including Cyber Security Woman of the Year 2020 and Application Security Influencer 2020 in India. Her passion for diversity and inclusion drives initiatives like InfosecGirls, WoSec, and InfosecKids, inspiring and empowering the next generation of security professionals.
Read more about Vandana Verma Sehgal