-
Book Overview & Buying
-
Table Of Contents
-
Feedback & Rating
Threat Modeling Best Practices
By :
How users access software, data, and services has changed over the years. A smartphone in our pocket is way more powerful than a home computer from a decade ago. While access to services has changed over the years, so has the way organizations bring those services to people. Today, an organization’s infrastructure is rarely hosted in one or two company-run data centers. It’s now a mixture of different third-party services, on-premise hardware, and cloud services. With this in mind, the threat model needs to adapt to account for these varied deployment models.
In this chapter, we’ll focus on how organizations deploy their services in diverse models such as on-premise IT/OT environments and cloud services. We’ll look at how these models impact the development of threat models. We’ll also introduce a method for visualizing attack paths that an attacker can take and how that can enhance your threat model....
Change the font size
Change margin width
Change background colour