The document discusses using threat models to control project scope and manage business requests. It provides information on what threat modeling is, why it is useful, and how to conduct threat modeling. Key points include:
- Threat models can help "lock" the project brief and scope by requiring any new features or changes to be evaluated in updated threat models.
- Threat models should be set up as the authoritative source of truth about security considerations and implications.
- Creating threat models for individual features allows for a tighter analysis of each component's risks and connections between components.
- Chaining multiple threat models together can help identify overarching vulnerabilities across the system.
- Penetration tests should be used to validate the
Related topics: