-
Book Overview & Buying
-
Table Of Contents
-
Feedback & Rating
Threat Modeling Best Practices
By :
Modern organizations rarely develop and deliver all components of their products and services in-house. Instead, they rely on a complex ecosystem of suppliers, partners, and service providers that span the globe. This globally connected and complex supply chain introduces significant security risks, as threats in any part of this network can impact the entire system. Just as the previous chapter examined how deployment models have evolved, this chapter explores how the increasing complexity of supply chains requires a similar evolution in our threat modeling approach.
In this chapter, we’ll discuss how to identify, assess, and mitigate the unique security challenges presented in a modern global supply chain. We’ll examine how an organization can create a process for mapping supply chain dependencies, categorizing critical assets, developing realistic threat scenarios, and prioritizing risks based on business impact. Through the lens...
Change the font size
Change margin width
Change background colour