Threat Modelling

A flowchart with five steps: 1. Identify Data, 2. Identify Use Cases, 3. Create Data Flow Diagrams, 4. Identify Threats, 5. Identify Controls.

Threat Modelling during the design process helps developments teams design in compliance and defence-in-depth by proactively identifying potential security threats, threat actors, attack surfaces, and key targets in a system or application.

This enables teams to allocate resources more efficiently by directing attention to the most significant security risks. Threat modeling results in a documented analysis of potential threats and mitigation supporting communicating a security culture across the enterprise in addition to establishing evidence of “Due Care” to prospects of your strategic investment.