Merge branch 'master' into master

This commit is contained in:
Mohammed A Imran 2022-05-30 15:51:46 +08:00 committed by GitHub
commit 68f590cc03
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23
1 changed files with 7 additions and 1 deletions

View File

@ -65,6 +65,7 @@ Contributions welcome. Add links through pull requests or create an issue to sta
- [Threat Modeling or Whiteboard Hacking training](https://www.toreon.com/threatmodeling/)
- [Kubernetes Threat Modeling](https://learning.oreilly.com/live-events/kubernetes-threat-modeling/0636920055610/0636920059945/)
## Videos
@ -173,7 +174,7 @@ Contributions welcome. Add links through pull requests or create an issue to sta
- [OWASP Threat Model Cookbook](https://github.com/OWASP/threat-model-cookbook)
- [Kubernetes Threat Model](https://github.com/kubernetes/community/tree/master/sig-security/security-audit-2019/findings)
- [Kubernetes Threat Model](https://github.com/kubernetes/sig-security/tree/main/sig-security-external-audit/security-audit-2019/findings)
- [ISO/SAE 21434 Annex G Example](https://github.com/Yakindu/YSA-examples)
@ -203,6 +204,11 @@ Contributions welcome. Add links through pull requests or create an issue to sta
- [TicTaaC](https://github.com/rusakovichma/TicTaaC) - Threat modeling-as-a-Code in a Tick (TicTaaC). Lightweight and easy-to-use Threat modeling solution following DevSecOps principles
- [Threat Modeling Online Game](https://github.com/dehydr8/elevation-of-privilege) - Online version of the Elevation of Privilege and Cornucopia card games. The easy way to get started with threat modeling.
- [Deciduous](https://github.com/rpetrich/deciduous) - A web app that simplifies building attack decision trees. Hosted at https://www.deciduous.app/
### Paid tools
- [Irius risk](https://iriusrisk.com/threat-modeling-tool/) - Iriusrisk is a threat modeling tool with an adaptive questionnaire driven by an expert system which guides the user through straight forward questions about the technical architecture, the planned features and security context of the application.