How to implement a ‘threat model’ to beef up your organization’s security
Reported today on TheNextWeb
For the full article visit: https://thenextweb.com/podium/2020/01/14/how-to-implement-a-threat-model-to-beef-up-your-organizations-security/
How to implement a 'threat model' to beef up your organization's security
Why threat models are the cornerstone of good security
In a world where cyber threats continue to grow in complexity and quantity each year, threat modeling is one of the most advantageous and practical tools organizations can use to shore up security.
What is a threat model? Simply put, this is a process designed to elevate an organization's security posture by cataloguing all assets within a given system that need to be protected, identifying by whom and what directions they might be attacked, and how exactly they can be safeguarded. The industry often associates these exercises with the early stages of the software development lifecycle, but it also applies to firmware and hardware as well.
If you're new to the concept, it's important to start with an understanding of each step involved. Let's take a look at the five main stages of building a threat model:
1. Take inventory of your assets
The first phase in developing a threat model is