After discussing security architecture and design principles, we will now introduce threat modeling security practices and tools. The adoption of threat modeling practices can help to reduce major security risks in the design phase. In addition, once the risks are identified, we will introduce how to apply OWASP secure design best practices to mitigate security risks.
The topics to be covered in this chapter are the following:
- Threat modeling practices
- Threat modeling with STRIDE
- Diagram designer tool
- Card game
- Threat library references
- Case study: formal documents or not?
- Secure design