Under active development Content is continuously updated and improved

16.14Conduct Threat Modeling

IG3
Software
Protect

>Control Description

Conduct threat modeling. Threat modeling is the process of identifying and addressing application security design flaws within a design, before code is created. It is conducted through specially trained individuals who evaluate the application design and gauge security risks for each entry point and access level. The goal is to map out the application, architecture, and infrastructure in a structured way to understand its weaknesses.

>Cross-Framework Mappings

Ask AI

Configure your API key to use AI features.