Useful Links
1. Introduction to Threat Modeling
2. The Threat Modeling Process Overview
3. System Decomposition and Modeling
4. Threat Identification and Enumeration
5. Threat Analysis and Risk Assessment
6. Validation and Verification
7. Integrating Threat Modeling into the Development Lifecycle
8. Domain-Specific Threat Modeling
9. Tooling and Automation
10. Scaling a Threat Modeling Program
  1. Computer Science
  2. Cybersecurity

Threat Modeling

1. Introduction to Threat Modeling
2. The Threat Modeling Process Overview
3. System Decomposition and Modeling
4. Threat Identification and Enumeration
5. Threat Analysis and Risk Assessment
6. Validation and Verification
7. Integrating Threat Modeling into the Development Lifecycle
8. Domain-Specific Threat Modeling
9. Tooling and Automation
10. Scaling a Threat Modeling Program
  1. Tooling and Automation
    1. Diagramming Tools
      1. General Purpose Tools
        1. Visio
          1. Lucidchart
            1. Draw.io
            2. Features and Limitations
              1. Collaboration Capabilities
              2. Specialized Threat Modeling Tools
                1. Microsoft Threat Modeling Tool
                  1. OWASP Threat Dragon
                    1. IriusRisk
                      1. ThreatModeler
                        1. Threat Enumeration Automation
                          1. Model Validation Features
                          2. Threat Modeling as Code
                            1. Principles and Benefits
                              1. Version Control
                                1. Collaboration
                                2. Automating Diagram Generation
                                  1. Code-Based Diagram Tools
                                    1. Integration with Source Repositories
                                    2. Integrating with CI/CD Pipelines
                                      1. Automated Checks
                                        1. Security Gates

                                    Previous

                                    8. Domain-Specific Threat Modeling

                                    Go to top

                                    Next

                                    10. Scaling a Threat Modeling Program

                                    © 2025 Useful Links. All rights reserved.

                                    About•Bluesky•X.com