Summary
This chapter introduced threat modeling. We looked at STRIDE and threat models that allow us to model threats to methods in our software. Next, we looked at attack trees to enable us to model multi-step attacks against our software. We quickly looked at mitigations we can utilize to reduce risks in our software.
In the next chapter, we drill into implementation in more depth, focusing on mitigations we can implement in our software.