-
Book Overview & Buying
-
Table Of Contents
The Official (ISC)2 Guide to the CCSP CBK - Second Edition
By :
Threat modeling is performed once an application design is created. The goal of threat modeling is to determine any weaknesses in the application and the potential ingress, egress, and actors involved before the weakness is introduced to production. It is the overall attack surface that is amplified by the cloud, and the threat model has to take that into account. Quite often, this involves a security professional determining various ways to attack the system or connections or even performing social engineering against staff with access to the system. The CCSP should always remember that the nature of threats faced by a system changes over time. Because of the dynamic nature of a changing threat landscape, constant vigilance and monitoring are important aspects of overall system security in the cloud.
STRIDE12 is a system for classifying known threats according to the kinds of exploits that are used or the motivation of the attacker. In the STRIDE...
Change the font size
Change margin width
Change background colour