Reviewing Different Threat Models
Threat modeling is a key component within any security operation center (SOC) and security environment as a whole, and just as with any SOC environment, there is no one size fits all for threat models.
This chapter will cover multiple threat models, their use cases, and their advantages and disadvantages. Doing so will allow the reader to apply the one that makes the most sense for their environment as well as provide a comparison point for comparing those threat models to ATT&CK:
- Reviewing the PASTA threat model and use cases
- Reviewing the STRIDE threat model and use cases
- Reviewing the VAST threat model and use cases
- Reviewing the Trike threat model and use cases
- Reviewing attack trees