mirror of
https://github.com/hysnsec/awesome-threat-modelling.git
synced 2024-10-01 08:25:38 -04:00
Fix awesome-lint issues
This commit is contained in:
parent
4c115b2d0a
commit
4a20d4e75e
9
Dockerfile
Normal file
9
Dockerfile
Normal file
@ -0,0 +1,9 @@
|
||||
FROM node:latest
|
||||
|
||||
RUN npm install --global awesome-lint
|
||||
|
||||
WORKDIR /src
|
||||
|
||||
RUN mkdir -p /src
|
||||
|
||||
ENTRYPOINT ["awesome-lint"]
|
159
README.md
159
README.md
@ -1,38 +1,39 @@
|
||||
|
||||
Welcome to Awesome Threat Modeling [![Awesome](https://cdn.rawgit.com/sindresorhus/awesome/d7305f38d29fed78fa85652e3a63e154dd8e8829/media/badge.svg)](https://github.com/sindresorhus/awesome)
|
||||
===================
|
||||
# Awesome Threat Modeling [![Awesome](https://awesome.re/badge.svg)](https://awesome.re)
|
||||
|
||||
![Awesome Threat modeling](images/awesome-threat-modelling.png)
|
||||
|
||||
A curated list of threat modeling resources ( Books, courses - free and paid, videos, tools, tutorials and workshop to practice on ) for learning Threat modeling and initial phases of security review.
|
||||
|
||||
### Contents
|
||||
Contributions welcome. Add links through pull requests or create an issue to start a discussion.
|
||||
|
||||
## Contents
|
||||
- [Books](#books)
|
||||
- [Courses](#courses)
|
||||
+ [Free](#free)
|
||||
+ [Paid](#paid)
|
||||
+[Free](#free)
|
||||
+[Paid](#paid)
|
||||
- [Videos](#videos)
|
||||
- [Tutorials and Blogs](#tutorials-and-blogs)
|
||||
- [Threat Model examples](#threat-model-examples)
|
||||
- [Tools](#tools)
|
||||
+ [Free tools](#free-tools)
|
||||
+ [Paid tools](#paid-tools)
|
||||
+[Free tools](#free-tools)
|
||||
+[Paid tools](#paid-tools)
|
||||
- [Contributing](#contributing)
|
||||
|
||||
|
||||
# Awesome Threat Modeling Resources
|
||||
- [License](#license)
|
||||
- [Sponsor](#sponsor)
|
||||
|
||||
## Books
|
||||
|
||||
*Books on threat modeling*
|
||||
|
||||
- [Threat Modeling: Designing for Security ](https://www.amazon.com/Threat-Modeling-Designing-Adam-Shostack/dp/1118809998) by Adam Shostack
|
||||
-[Threat Modeling: Designing for Security](https://www.amazon.com/Threat-Modeling-Designing-Adam-Shostack/dp/1118809998) by Adam Shostack
|
||||
|
||||
- [Threat Modeling](https://www.amazon.in/Threat-Modeling-Microsoft-Professional-Swiderski/dp/0735619913) by Frank Swiderski, Window Snyder
|
||||
-[Threat Modeling](https://www.amazon.in/Threat-Modeling-Microsoft-Professional-Swiderski/dp/0735619913) by Frank Swiderski, Window Snyder
|
||||
|
||||
|
||||
- [Risk Centric Threat Modeling: Process for Attack Simulation and Threat Analysis](https://www.amazon.in/Risk-Centric-Threat-Modeling-Simulation/dp/0470500964)
|
||||
-[Risk Centric Threat Modeling: Process for Attack Simulation and Threat Analysis](https://www.amazon.in/Risk-Centric-Threat-Modeling-Simulation/dp/0470500964)
|
||||
by Tony UcedaVelez (Author), Marco M. Morana (Author)
|
||||
|
||||
|
||||
- [Threat Modeling](https://www.oreilly.com/library/view/threat-modeling/9781492056546/) by Matthew J. Coles, Izar Tarandach
|
||||
-[Threat Modeling](https://www.oreilly.com/library/view/threat-modeling/9781492056546/) by Matthew J. Coles, Izar Tarandach
|
||||
|
||||
|
||||
## Courses
|
||||
@ -42,119 +43,119 @@ by Tony UcedaVelez (Author), Marco M. Morana (Author)
|
||||
|
||||
### Free
|
||||
|
||||
[Threat Modeling, or Architectural Risk Analysis](https://www.coursera.org/lecture/software-security/threat-modeling-or-architectural-risk-analysis-bQAoU) by Coursera
|
||||
-[Threat Modeling, or Architectural Risk Analysis](https://www.coursera.org/lecture/software-security/threat-modeling-or-architectural-risk-analysis-bQAoU) by Coursera
|
||||
|
||||
[Threat Modeling Workshop](https://github.com/rhurlbut/CodeMash2019/blob/master/Robert-Hurlbut-CodeMash2019-Threat-Modeling-Workshop-20190108.pdf) by Robert Hurlbut
|
||||
-[Threat Modeling Workshop](https://github.com/rhurlbut/CodeMash2019/blob/master/Robert-Hurlbut-CodeMash2019-Threat-Modeling-Workshop-20190108.pdf) by Robert Hurlbut
|
||||
|
||||
|
||||
### Paid
|
||||
|
||||
[DevSecOps Expert](https://www.practical-devsecops.com/certified-devsecops-expert/) by [Practical DevSecOps](https://www.practical-devsecops.com)
|
||||
-[DevSecOps Expert](https://www.practical-devsecops.com/certified-devsecops-expert/) by [Practical DevSecOps](https://www.practical-devsecops.com)
|
||||
|
||||
[Threat Modeling Fundamentals](https://www.pluralsight.com/courses/threat-modeling-fundamentals) by Pluralsight
|
||||
-[Threat Modeling Fundamentals](https://www.pluralsight.com/courses/threat-modeling-fundamentals) by Pluralsight
|
||||
|
||||
[CyberSec First Responder: Threat Detection & Response CFR210](https://www.udemy.com/course/cybersec-first-responder-threat-detection-response-cfr210/) by Stone River eLearning
|
||||
-[CyberSec First Responder: Threat Detection & Response CFR210](https://www.udemy.com/course/cybersec-first-responder-threat-detection-response-cfr210/) by Stone River eLearning
|
||||
|
||||
[Learning Threat Modeling for Security Professionals](https://www.lynda.com/Web-Development-tutorials/Learning-Threat-Modeling-Security-Professionals/769294-2.html) by Adam Shostack
|
||||
-[Learning Threat Modeling for Security Professionals](https://www.lynda.com/Web-Development-tutorials/Learning-Threat-Modeling-Security-Professionals/769294-2.html) by Adam Shostack
|
||||
|
||||
[Threat Modeling: Spoofing In Depth](https://www.lynda.com/IT-tutorials/Threat-Modeling-Spoofing-Depth/769300-2.html?srchtrk=index%3a7%0alinktypeid%3a2%0aq%3athreat+modelling%0apage%3a1%0as%3arelevance%0asa%3atrue%0aproducttypeid%3a2) by Adam Shostack
|
||||
-[Threat Modeling: Spoofing In Depth](https://www.lynda.com/IT-tutorials/Threat-Modeling-Spoofing-Depth/769300-2.html?srchtrk=index%3a7%0alinktypeid%3a2%0aq%3athreat+modelling%0apage%3a1%0as%3arelevance%0asa%3atrue%0aproducttypeid%3a2) by Adam Shostack
|
||||
|
||||
[Threat Modeling: Tampering in Depth](https://www.lynda.com/IT-tutorials/Threat-Modeling-Tampering-Depth/2810167-2.html?srchtrk=index%3a1%0alinktypeid%3a2%0aq%3athreat+modelling%0apage%3a1%0as%3arelevance%0asa%3atrue%0aproducttypeid%3a2) by Adam Shostack
|
||||
-[Threat Modeling: Tampering in Depth](https://www.lynda.com/IT-tutorials/Threat-Modeling-Tampering-Depth/2810167-2.html?srchtrk=index%3a1%0alinktypeid%3a2%0aq%3athreat+modelling%0apage%3a1%0as%3arelevance%0asa%3atrue%0aproducttypeid%3a2) by Adam Shostack
|
||||
|
||||
[Threat Modeling or Whiteboard Hacking training](https://www.toreon.com/threatmodeling/) by Toreon
|
||||
-[Threat Modeling or Whiteboard Hacking training](https://www.toreon.com/threatmodeling/) by Toreon
|
||||
|
||||
|
||||
## Videos
|
||||
|
||||
*Videos talking about Threat modeling*
|
||||
|
||||
[Introduction, Threat Models](https://www.youtube.com/watch?v=GqmQg-cszw4) by
|
||||
MIT OpenCourseWare
|
||||
-[Introduction, Threat Models](https://www.youtube.com/watch?v=GqmQg-cszw4) by
|
||||
-MIT OpenCourseWare
|
||||
|
||||
[Creating a Threat Model using TMT 2016](https://www.youtube.com/watch?v=-VokDIHS5XM) by Alan B. Watkins
|
||||
-[Creating a Threat Model using TMT 2016](https://www.youtube.com/watch?v=-VokDIHS5XM) by Alan B. Watkins
|
||||
|
||||
[Using Threat Modeling](https://www.youtube.com/watch?v=n8ozucTo810) by Synopsys
|
||||
-[Using Threat Modeling](https://www.youtube.com/watch?v=n8ozucTo810) by Synopsys
|
||||
|
||||
[Threat Modeling in 2019](https://www.youtube.com/watch?v=ZoxHIpzaZ6U) by Adam Shostack
|
||||
-[Threat Modeling in 2019](https://www.youtube.com/watch?v=ZoxHIpzaZ6U) by Adam Shostack
|
||||
|
||||
[Threat Modeling Toolkit](https://www.youtube.com/watch?v=KGy_KCRUGd4) by Jonathan Marcil
|
||||
-[Threat Modeling Toolkit](https://www.youtube.com/watch?v=KGy_KCRUGd4) by Jonathan Marcil
|
||||
|
||||
[Adaptive Threat Modelling](https://www.youtube.com/watch?v=YTtO_TGV2fU) by Aaron Bedra
|
||||
-[Adaptive Threat Modelling](https://www.youtube.com/watch?v=YTtO_TGV2fU) by Aaron Bedra
|
||||
|
||||
[Threat modeling](https://www.youtube.com/watch?v=v8aYNcE1QlI) by Erlend Oftedal
|
||||
-[Threat modeling](https://www.youtube.com/watch?v=v8aYNcE1QlI) by Erlend Oftedal
|
||||
|
||||
[Threat Model Every Story: Practical Continuous Threat Modeling Work for Your Team](https://www.youtube.com/watch?v=VbW-X0j35gw) by Izar Tarandach
|
||||
-[Threat Model Every Story: Practical Continuous Threat Modeling Work for Your Team](https://www.youtube.com/watch?v=VbW-X0j35gw) by Izar Tarandach
|
||||
|
||||
[Threat Modeling for Secure Software Design ](https://www.youtube.com/watch?v=OH2LqzDk2Zg) by Robert Hurlbut
|
||||
-[Threat Modeling for Secure Software Design](https://www.youtube.com/watch?v=OH2LqzDk2Zg) by Robert Hurlbut
|
||||
|
||||
[Fixing Threat Models with OWASP Efforts ](https://www.youtube.com/watch?v=-dQcg0FDLpk) by Tony UcedaVelez
|
||||
-[Fixing Threat Models with OWASP Efforts](https://www.youtube.com/watch?v=-dQcg0FDLpk) by Tony UcedaVelez
|
||||
|
||||
[Designing for Security through Threat Modelling](https://www.youtube.com/watch?v=6fhEdJ9YcU0)
|
||||
-[Designing for Security through Threat Modelling](https://www.youtube.com/watch?v=6fhEdJ9YcU0)
|
||||
|
||||
[Unlocking Threat Modeling](https://www.youtube.com/watch?v=J_ksjjUz73s) by Brook Schoenfield
|
||||
-[Unlocking Threat Modeling](https://www.youtube.com/watch?v=J_ksjjUz73s) by Brook Schoenfield
|
||||
|
||||
[An Agile Approach to Threat Modeling for Securing Open Source Project EdgeX Foundry](https://www.youtube.com/watch?v=iw-FzeKaj48) by Tingyu Zeng
|
||||
-[An Agile Approach to Threat Modeling for Securing Open Source Project EdgeX Foundry](https://www.youtube.com/watch?v=iw-FzeKaj48) by Tingyu Zeng
|
||||
|
||||
## Tutorials and Blogs
|
||||
|
||||
*Tutorials and blogs that explain threat modeling*
|
||||
|
||||
[Threat Modeling: What, Why, and How?](https://misti.com/infosec-insider/threat-modeling-what-why-and-how) By Adam Shostack
|
||||
-[Threat Modeling: What, Why, and How?](https://misti.com/infosec-insider/threat-modeling-what-why-and-how) By Adam Shostack
|
||||
|
||||
[Threat Modeling: 12 Available Methods](https://insights.sei.cmu.edu/sei_blog/2018/12/threat-modeling-12-available-methods.html) By Carnegie Mellon University
|
||||
-[Threat Modeling: 12 Available Methods](https://insights.sei.cmu.edu/sei_blog/2018/12/threat-modeling-12-available-methods.html) By Carnegie Mellon University
|
||||
|
||||
[What Is Security Threat Modeling?](https://www.dummies.com/programming/certification/security-threat-modeling/) by Lawrence C. Miller, Peter H. Gregory
|
||||
-[What Is Security Threat Modeling?](https://www.dummies.com/programming/certification/security-threat-modeling/) by Lawrence C. Miller, Peter H. Gregory
|
||||
|
||||
[Threat-modeling CheatSheet By Owasp](https://cheatsheetseries.owasp.org/cheatsheets/Threat_Modeling_Cheat_Sheet.html) by OWASP
|
||||
-[Threat-modeling CheatSheet By Owasp](https://cheatsheetseries.owasp.org/cheatsheets/Threat_Modeling_Cheat_Sheet.html) by OWASP
|
||||
|
||||
[Threat Modeling in the Enterprise, Part 1: Understanding the Basics](https://securityintelligence.com/threat-modeling-in-the-enterprise-part-1-understanding-the-basics/) by Stiliyana Simeonova
|
||||
-[Threat Modeling in the Enterprise, Part 1: Understanding the Basics](https://securityintelligence.com/threat-modeling-in-the-enterprise-part-1-understanding-the-basics/) by Stiliyana Simeonova
|
||||
|
||||
[Approachable threat modeling](https://increment.com/security/approachable-threat-modeling/) by
|
||||
-[Approachable threat modeling](https://increment.com/security/approachable-threat-modeling/) by
|
||||
|
||||
[Threat Modeling for Dummies](https://www.slideshare.net/AdamEnglander/threat-modeling-for-dummies-cascadia-php-2018) by Adam Englander
|
||||
-[Threat Modeling for Dummies](https://www.slideshare.net/AdamEnglander/threat-modeling-for-dummies-cascadia-php-2018) by Adam Englander
|
||||
|
||||
[DevSecOps, Threat Modeling and You: Get started using the STRIDE method](https://medium.com/@brunoamaroalmeida/devsecops-threat-modelling-and-you-get-started-using-the-stride-method-85d143ab86f4) by Bruno Amaro Almeida
|
||||
-[DevSecOps, Threat Modeling and You: Get started using the STRIDE method](https://medium.com/@brunoamaroalmeida/devsecops-threat-modelling-and-you-get-started-using-the-stride-method-85d143ab86f4) by Bruno Amaro Almeida
|
||||
|
||||
[Threat Modeling: The Why, How, When and Which Tools](https://devops.com/threat-modeling-the-why-how-when-and-which-tools/) by Debarghya Pandit
|
||||
-[Threat Modeling: The Why, How, When and Which Tools](https://devops.com/threat-modeling-the-why-how-when-and-which-tools/) by Debarghya Pandit
|
||||
|
||||
[Threat-modeling datasheet](https://www.synopsys.com/content/dam/synopsys/sig-assets/datasheets/threat-modeling-datasheet.pdf) by Synopsys
|
||||
-[Threat-modeling datasheet](https://www.synopsys.com/content/dam/synopsys/sig-assets/datasheets/threat-modeling-datasheet.pdf) by Synopsys
|
||||
|
||||
[Threat Modeling blog](https://blog.securityinnovation.com/topic/threat-modeling) by Security Innovation
|
||||
-[Threat Modeling blog](https://blog.securityinnovation.com/topic/threat-modeling) by Security Innovation
|
||||
|
||||
[Threat Modeling: 6 Mistakes You’re Probably Making](https://www.varonis.com/blog/threat-modeling/) by Jeff Petters
|
||||
-[Threat Modeling: 6 Mistakes You are Probably Making](https://www.varonis.com/blog/threat-modeling/) by Jeff Petters
|
||||
|
||||
[How to Create a Threat Model for Cloud Infrastructure Security](https://www.threatstack.com/blog/how-to-create-a-threat-model-for-cloud-infrastructure-security) by Pat Cable
|
||||
-[How to Create a Threat Model for Cloud Infrastructure Security](https://www.threatstack.com/blog/how-to-create-a-threat-model-for-cloud-infrastructure-security) by Pat Cable
|
||||
|
||||
[Why You Should Care About Threat Modelling](https://community.arm.com/developer/ip-products/security/b/security-ip-blog/posts/why-you-should-care-about-threat-modelling) by Suresh Marisetty
|
||||
-[Why You Should Care About Threat Modelling](https://community.arm.com/developer/ip-products/security/b/security-ip-blog/posts/why-you-should-care-about-threat-modelling) by Suresh Marisetty
|
||||
|
||||
[Benefits of Threat Modeling](https://nvisium.com/blog/2019/05/30/benefits-of-threat-modeling.html) by Sangita Prajapati
|
||||
-[Benefits of Threat Modeling](https://nvisium.com/blog/2019/05/30/benefits-of-threat-modeling.html) by Sangita Prajapati
|
||||
|
||||
[Threat Modeling: a Summary of Available Methods Whitepaper](https://resources.sei.cmu.edu/asset_files/WhitePaper/2018_019_001_524597.pdf) by Nataliya Shevchenko, Timothy A. Chick, Paige O’Riordan, Thomas Patrick Scanlon, PhD, & Carol Woody, PhD
|
||||
-[Threat Modeling: a Summary of Available Methods Whitepaper](https://resources.sei.cmu.edu/asset_files/WhitePaper/2018_019_001_524597.pdf) by Nataliya Shevchenko, Timothy A. Chick, Paige O'Riordan, Thomas Patrick Scanlon, PhD, & Carol Woody, PhD
|
||||
|
||||
[Threat Modelling Toolkit](https://www.owasp.org/images/0/00/Threat_Modelling_-_STRIDE_Cards_-_TW_Branded.pdf) by ThoughtWorks
|
||||
-[Threat Modelling Toolkit](https://www.owasp.org/images/0/00/Threat_Modelling_-_STRIDE_Cards_-_TW_Branded.pdf) by ThoughtWorks
|
||||
|
||||
[How to get started with Threat Modeling, before you get hacked](https://hackernoon.com/how-to-get-started-with-threat-modeling-before-you-get-hacked-1bf0ea3310df) by Hackernoon
|
||||
-[How to get started with Threat Modeling, before you get hacked](https://hackernoon.com/how-to-get-started-with-threat-modeling-before-you-get-hacked-1bf0ea3310df) by Hackernoon
|
||||
|
||||
[Thread Modeling tutorial](https://www.geeksforgeeks.org/threat-modelling/) by Geeks For Geeks
|
||||
-[Thread Modeling tutorial](https://www.geeksforgeeks.org/threat-modelling/) by Geeks For Geeks
|
||||
|
||||
[How to analyze the security of your application with threat modeling](https://www.freecodecamp.org/news/threat-modeling-goran-aviani/) by Goran Aviani
|
||||
-[How to analyze the security of your application with threat modeling](https://www.freecodecamp.org/news/threat-modeling-goran-aviani/) by Goran Aviani
|
||||
|
||||
[Tactical Threat Modeling](https://safecode.org/wp-content/uploads/2017/05/SAFECode_TM_Whitepaper.pdf) by SafeCode
|
||||
-[Tactical Threat Modeling](https://safecode.org/wp-content/uploads/2017/05/SAFECode_TM_Whitepaper.pdf) by SafeCode
|
||||
|
||||
[The Power of a Tailored Threat Model Whitepaper](https://www.lookingglasscyber.com/resources/white-papers/the-power-of-a-tailored-threat-model/) by Looking Glass
|
||||
-[The Power of a Tailored Threat Model Whitepaper](https://www.lookingglasscyber.com/resources/white-papers/the-power-of-a-tailored-threat-model/) by Looking Glass
|
||||
|
||||
[7 Easy Steps For Building a Scalable Threat Modeling Process](https://go.threatmodeler.com/7-steps-building-scalable-threat-modeling-process) by Threatmodeler
|
||||
-[7 Easy Steps For Building a Scalable Threat Modeling Process](https://go.threatmodeler.com/7-steps-building-scalable-threat-modeling-process) by Threatmodeler
|
||||
|
||||
[Where is my Threat Model?](https://blog.appsecco.com/where-is-my-threat-model-b6f8b077ac47) by Abhisek Datta
|
||||
-[Where is my Threat Model?](https://blog.appsecco.com/where-is-my-threat-model-b6f8b077ac47) by Abhisek Datta
|
||||
|
||||
|
||||
## Threat Model examples
|
||||
|
||||
[SSL Threat model](https://www.ssllabs.com/downloads/SSL_Threat_Model.png) by Qualys
|
||||
-[SSL Threat model](https://www.ssllabs.com/downloads/SSL_Threat_Model.png) by Qualys
|
||||
|
||||
[DNS Security: Threat Modeling DNSSEC, DoT, and DoH](https://www.netmeister.org/blog/doh-dot-dnssec.html) by Jan Schaumann
|
||||
-[DNS Security: Threat Modeling DNSSEC, DoT, and DoH](https://www.netmeister.org/blog/doh-dot-dnssec.html) by Jan Schaumann
|
||||
|
||||
[Email Encryption Gateway Threat model](https://www.slideshare.net/NCC_Group/real-world-application-threat-modelling-by-example) by NCC Group
|
||||
-[Email Encryption Gateway Threat model](https://www.slideshare.net/NCC_Group/real-world-application-threat-modelling-by-example) by NCC Group
|
||||
|
||||
|
||||
## Tools
|
||||
@ -163,30 +164,32 @@ MIT OpenCourseWare
|
||||
|
||||
### Free tools
|
||||
|
||||
[OWASP Threat Dragon](https://www.owasp.org/index.php/OWASP_Threat_Dragon) - An online threat modelling web application including system diagramming and a rule engine to auto-generate threats/mitigations.
|
||||
-[OWASP Threat Dragon](https://www.owasp.org/index.php/OWASP_Threat_Dragon) - An online threat modelling web application including system diagramming and a rule engine to auto-generate threats/mitigations.
|
||||
|
||||
[Microsoft Threat Modeling Tool](https://docs.microsoft.com/en-gb/azure/security/develop/threat-modeling-tool) - Microsoft Threat Modeling Tool 2016 is a tool that helps in finding threats in the design phase of software projects.
|
||||
-[Microsoft Threat Modeling Tool](https://docs.microsoft.com/en-gb/azure/security/develop/threat-modeling-tool) - Microsoft Threat Modeling Tool 2016 is a tool that helps in finding threats in the design phase of software projects.
|
||||
|
||||
[Owasp-threat-dragon-gitlab](https://github.com/appsecco/owasp-threat-dragon-gitlab) - This project is a fork of the original OWASP Threat Dragon web application by Mike Goodwin with Gitlab integration instead of Github. You can use it with the Gitlab.com or your own instance of Gitlab.
|
||||
-[Owasp-threat-dragon-gitlab](https://github.com/appsecco/owasp-threat-dragon-gitlab) - This project is a fork of the original OWASP Threat Dragon web application by Mike Goodwin with Gitlab integration instead of GitHub. You can use it with the Gitlab.com or your own instance of Gitlab.
|
||||
|
||||
[Raindance](https://github.com/devsecops/raindance) - Project intended to make Attack Maps part of software development by reducing the time it takes to complete them
|
||||
-[Raindance](https://github.com/devsecops/raindance) - Project intended to make Attack Maps part of software development by reducing the time it takes to complete them
|
||||
|
||||
[Threatspec](https://threatspec.org/) - Threatspec is an open source project that aims to close the gap between development and security by bringing the threat modelling process further into the development process.
|
||||
-[Threatspec](https://threatspec.org/) - Threatspec is an open source project that aims to close the gap between development and security by bringing the threat modelling process further into the development process.
|
||||
|
||||
|
||||
### Paid tools
|
||||
|
||||
[Irius risk](https://iriusrisk.com/threat-modeling-tool/) - Iriusrisk is a threat modeling tool with an adaptive questionnaire driven by an expert system which guides the user through straight forward questions about the technical architecture, the planned features and security context of the application.
|
||||
|
||||
[SD elements](https://www.securitycompass.com/sdelements/threat-modeling/) - Automate Threat Modeling with SD Elements
|
||||
|
||||
[Foreseeti](https://www.foreseeti.com/) - SecuriCAD Vanguard is an attack simulation and automated threat modeling SaaS service that enables you to automatically simulate attacks on a virtual model of your AWS environment.
|
||||
-[Irius risk](https://iriusrisk.com/threat-modeling-tool/) - Iriusrisk is a threat modeling tool with an adaptive questionnaire driven by an expert system which guides the user through straight forward questions about the technical architecture, the planned features and security context of the application.
|
||||
|
||||
-[SD elements](https://www.securitycompass.com/sdelements/threat-modeling/) - Automate Threat Modeling with SD Elements
|
||||
|
||||
-[Foreseeti](https://www.foreseeti.com/) - SecuriCAD Vanguard is an attack simulation and automated threat modeling SaaS service that enables you to automatically simulate attacks on a virtual model of your AWS environment.
|
||||
|
||||
## Contributing
|
||||
|
||||
Please refer the guidelines at [contributing.md for details](Contributing.md).
|
||||
Please refer the guidelines at [contributing.md for details](contributing.md).
|
||||
|
||||
## Sponsored by
|
||||
## License
|
||||
|
||||
[![CC0](http://mirrors.creativecommons.org/presskit/buttons/88x31/svg/cc-zero.svg)](https://creativecommons.org/publicdomain/zero/1.0/)
|
||||
|
||||
## Sponsor
|
||||
![Practical DevSecOps](images/practical-devsecops-logo.png)
|
||||
|
BIN
images/awesome-threat-modelling.png
Normal file
BIN
images/awesome-threat-modelling.png
Normal file
Binary file not shown.
After Width: | Height: | Size: 72 KiB |
Loading…
Reference in New Issue
Block a user