Useful Links
Computer Science
Cybersecurity
Threat Modeling
1. Introduction to Threat Modeling
2. The Threat Modeling Process Overview
3. System Decomposition and Modeling
4. Threat Identification and Enumeration
5. Threat Analysis and Risk Assessment
6. Validation and Verification
7. Integrating Threat Modeling into the Development Lifecycle
8. Domain-Specific Threat Modeling
9. Tooling and Automation
10. Scaling a Threat Modeling Program
Tooling and Automation
Diagramming Tools
General Purpose Tools
Visio
Lucidchart
Draw.io
Features and Limitations
Collaboration Capabilities
Specialized Threat Modeling Tools
Microsoft Threat Modeling Tool
OWASP Threat Dragon
IriusRisk
ThreatModeler
Threat Enumeration Automation
Model Validation Features
Threat Modeling as Code
Principles and Benefits
Version Control
Collaboration
Automating Diagram Generation
Code-Based Diagram Tools
Integration with Source Repositories
Integrating with CI/CD Pipelines
Automated Checks
Security Gates
Previous
8. Domain-Specific Threat Modeling
Go to top
Next
10. Scaling a Threat Modeling Program