body { font-family: 'General Sans Medium', sans-serif; color: #1C1C1C; margin: 0; padding: 0; } .summary-container { width: 100%; margin: 40px 0 40px 0; padding: 30px 20px 20px 40px; background-color: #FFFFFF; box-shadow: 0 4px 8px rgba(0, 0, 0, 0.1); border-radius: 8px; } .section-summary { margin-bottom: 20px; } .section-title { display: flow; font-size: 20px !important; margin: 10px 0; position: relative; padding-left: 20px; } .section-title a:last-child, .section-title button:last-child { margin-left: 0 !important; } .section-title::before { content: ''; width: 10px; height: 10px; background-color: #F5ED63; border-radius: 50%; position: absolute; left: 0; top: 50%; transform: translateY(-50%); } .section-title a { text-decoration: none; color: inherit; font-family: inherit; font-size: inherit; } .section-title a:hover { text-decoration: underline; } .section-subtitle { font-size: 18px !important; margin: 0 0 5px 0px; } .section-subtitle a { text-decoration: none; color: inherit; font-family: inherit; font-size: inherit; margin-left: 20px; } .section-subtitle a:hover { text-decoration: underline; } What is threat modeling? When should you start threat modeling? What resources are needed? Some existing threat modeling methods STRIDE DREAD Quantitative Threat Modeling LINDDUN PASTA Which threat modeling method should you choose for your organization? Threat modeling tools Knowledge base of threats and attack scenarios General threat modeling approach used How can threat modeling impact your GRC approach? There are several threat modeling methods. The best model for your organization’s needs will depend on the types of threats you are trying to model and what your goals are. Not all of these methods are complete. Some are abstract, others focus on people, risks or privacy issues. However, these methods can be combined to create a more robust and comprehensive view of the potential threats facing your IT assets. In this article, we will present an overview of five of these methods. What is threat modeling? Threat modeling was initially a technical activity, limited to large-scale developments, in an agile context. Over the past decade, this activity has developed to the point where it is now part of the controls required for compliance with the 2022 version of the ISO 27002 cybersecurity standard. This relatively simple activity places security at the beginning of projects, where changes are the least resource-intensive. This is the first brick in the foundation of security by design. Why is threat modeling important? The goal is to use a simple analysis to discover the structural points where information security is at risk, in architectures or in systems, such as in applications which are being developed. For new deployments, this preliminary analysis ensures that there are no obstacles in the implementation of security measures, such as reliance on insecure systems, weak authentication or protocols. Traditionally, threat modeling has mostly been focused on application development. However, it is also possible to extend the analysis to availability issues, such as scaled deployments (e.g., redundancy), authentication, upgrades and cross-border data transfer issues. An approach for entire systems can easily be modeled on application architectures. When should you start threat modeling? According to best practices, the necessary security criteria must be defined in advance in order to validate the design or the architecture. This analysis is used to check compliance with the generic criteria and to review the technical choices made during this design/architecture phase. This security operation can therefore be performed during all stages of the project. Nevertheless, it is better if this is done before validating the design or the architecture. In this way, it will be less expensive to make any necessary modifications. It is also possible to do intermediate or partial modeling in order to identify security problems as early as possible and again to reduce design costs. What resources are needed? Few human resources are needed, but they can be difficult to find depending on the business environment. First of all, it is necessary to have at least one person who understands the structure to be analyzed (the software, infrastructure, etc.) and the underlying deployment. Depending on the method and the tool used, it is necessary/indispensable to have someone who is familiar with cybersecurity attacks and is able to translate them, in a defensive context, into protection measures. The person in charge of the analyzed component (application, infrastructure, etc.) and usually the person in charge of the evolution of this component (e.g., the SCRUM master) need to integrate the findings into the ongoing evolutions. The risk manager should attend the meetings to identify the technical risks so that they can be better assessed. For broader analyses, it is important to have a legal representative who understands t