Reader small image

You're reading from  Implementing DevSecOps Practices

Product typeBook
Published inDec 2023
PublisherPackt
ISBN-139781803231495
Edition1st Edition
Right arrow
Author (1)
Vandana Verma Sehgal
Vandana Verma Sehgal
author image
Vandana Verma Sehgal

Vandana Verma Sehgal is a seasoned cybersecurity professional with over 17 years of experience, specializes in DevSecOps, and has a diverse background in Vulnerability management, SOC, Infrastructure, Application, and Cloud Security. She is a speaker and trainer, having presented at events like Global OWASP AppSec, BlackHat, and Grace Hopper. Vandana actively contributes to the cybersecurity community as a member of the OWASP Global Board of Directors, and Black Hat Asia Review Board and is deeply involved in diversity initiatives like InfosecGirls, WoSec, and null. She has earned numerous awards, including Cyber Security Woman of the Year 2020 and Application Security Influencer 2020 in India. Her passion for diversity and inclusion drives initiatives like InfosecGirls, WoSec, and InfosecKids, inspiring and empowering the next generation of security professionals.
Read more about Vandana Verma Sehgal

Right arrow

Why should we perform threat modeling?

Threat modeling is an essential step in the software development and system design process, focusing on foreseeing and addressing potential vulnerabilities. Performing threat modeling has a myriad of advantages, and here’s why it should be integrated into the development life cycle:

  • Proactive approach to security: Rather than taking a reactive stance and waiting for vulnerabilities to be discovered or exploited, threat modeling allows you to anticipate potential threats and address them in advance.

    Example: Before deploying a web application, a threat model might identify that the application is susceptible to SQL injection. By catching this in the design phase, developers can write more secure code to prevent this well-known attack vector.

  • Cost-efficient: Addressing security issues early in the design or development phase is significantly cheaper than dealing with breaches or vulnerabilities after deployment.

    Example: If a major...

lock icon
The rest of the page is locked
Previous PageNext Page
You have been reading a chapter from
Implementing DevSecOps Practices
Published in: Dec 2023Publisher: PacktISBN-13: 9781803231495

Author (1)

author image
Vandana Verma Sehgal

Vandana Verma Sehgal is a seasoned cybersecurity professional with over 17 years of experience, specializes in DevSecOps, and has a diverse background in Vulnerability management, SOC, Infrastructure, Application, and Cloud Security. She is a speaker and trainer, having presented at events like Global OWASP AppSec, BlackHat, and Grace Hopper. Vandana actively contributes to the cybersecurity community as a member of the OWASP Global Board of Directors, and Black Hat Asia Review Board and is deeply involved in diversity initiatives like InfosecGirls, WoSec, and null. She has earned numerous awards, including Cyber Security Woman of the Year 2020 and Application Security Influencer 2020 in India. Her passion for diversity and inclusion drives initiatives like InfosecGirls, WoSec, and InfosecKids, inspiring and empowering the next generation of security professionals.
Read more about Vandana Verma Sehgal