From 0fb18ebad7bb0dec5783ee5378aad6e37fed7587 Mon Sep 17 00:00:00 2001 From: Sivakumar <39010220+ladecruze@users.noreply.github.com> Date: Wed, 1 Jun 2022 10:28:10 +0530 Subject: [PATCH] Update README.md --- README.md | 39 ++++++++++++++++++++------------------- 1 file changed, 20 insertions(+), 19 deletions(-) diff --git a/README.md b/README.md index dcf2cc0..c3240ab 100644 --- a/README.md +++ b/README.md @@ -160,31 +160,18 @@ Contributions welcome. Add links through pull requests or create an issue to sta - [DNS Security: Threat Modeling DNSSEC, DoT, and DoH](https://www.netmeister.org/blog/doh-dot-dnssec.html) -- [Playbook for Threat Modeling Medical Devices](https://www.mitre.org/sites/default/files/publications/Playbook-for-Threat-Modeling-Medical-Devices.pdf) - -- [Threat Modeling Trinity](https://github.com/juliocesarfort/public-pentesting-reports/blob/master/COMSATS_Islamabad-CyberSecurityLab/Threat_Modeling_Trinity_Wallet.pdf) - - - [Threat Modeling Contact Tracing Applications](https://www.linkedin.com/pulse/threat-modeling-contact-tracing-applications-jakub-kaluzny/) - - - [Threat Modeling Process](https://owasp.org/www-community/Threat_Modeling_Process) +- [Threat Modeling Process](https://owasp.org/www-community/Threat_Modeling_Process) - - [Developers Guide Securing Mobile Applications](https://www.synopsys.com/content/dam/synopsys/sig-assets/ebooks/developers-guide-securing-mobile-applications-threat-modeling.pdf) +- [Developers Guide Securing Mobile Applications](https://www.synopsys.com/content/dam/synopsys/sig-assets/ebooks/developers-guide-securing-mobile-applications-threat-modeling.pdf) - - [Finding Vulnerabilities In Swiss Posts](https://www.reversemode.com/2022/01/finding-vulnerabilities-in-swiss-posts.html?m=1#AttackSurface) +- [Finding Vulnerabilities In Swiss Posts](https://www.reversemode.com/2022/01/finding-vulnerabilities-in-swiss-posts.html?m=1#AttackSurface) - - [Threat Matrix CI/CD](https://github.com/rung/threat-matrix-cicd) +- [Threat Matrix CI/CD](https://github.com/rung/threat-matrix-cicd) - - [Top 10 CI/CD Security Risks](https://github.com/cider-security-research/top-10-cicd-security-risks) +- [Top 10 CI/CD Security Risks](https://github.com/cider-security-research/top-10-cicd-security-risks) - - [ECS Fargate Threat Modeling](https://sysdig.com/blog/ecs-fargate-threat-modeling/) +- [ECS Fargate Threat Modeling](https://sysdig.com/blog/ecs-fargate-threat-modeling/) - - [IETF Trans Threat Analysis](https://datatracker.ietf.org/doc/html/draft-ietf-trans-threat-analysis-16) - - - [Secure Password Storage](https://owasp.org/www-pdf-archive//Secure_Password_Storage.pdf) - - - [Human Threat Model](https://github.com/JWWeatherman/human_threat_model) - - - [Smart Home Threat Model](https://github.com/kkredit/smart-home-threat-model) ## Threat Model examples @@ -210,6 +197,20 @@ Contributions welcome. Add links through pull requests or create an issue to sta - [Amazon S3](https://controlcatalog.trustoncloud.com/dashboard/aws/s3#Data%20Flow%20Diagram) +- [Playbook for Threat Modeling Medical Devices](https://www.mitre.org/sites/default/files/publications/Playbook-for-Threat-Modeling-Medical-Devices.pdf) + +- [Threat Modeling Trinity](https://github.com/juliocesarfort/public-pentesting-reports/blob/master/COMSATS_Islamabad-CyberSecurityLab/Threat_Modeling_Trinity_Wallet.pdf) + +- [Threat Modeling Contact Tracing Applications](https://www.linkedin.com/pulse/threat-modeling-contact-tracing-applications-jakub-kaluzny/) + +- [Secure Password Storage](https://owasp.org/www-pdf-archive//Secure_Password_Storage.pdf) + +- [Human Threat Model](https://github.com/JWWeatherman/human_threat_model) + +- [Smart Home Threat Model](https://github.com/kkredit/smart-home-threat-model) + +- [IETF Trans Threat Analysis](https://datatracker.ietf.org/doc/html/draft-ietf-trans-threat-analysis-16) + ## Tools *Tools which helps in threat modelling.*