Video, examples and tools addition. Fixed Contributing reference

This commit is contained in:
izar 2020-02-03 12:49:40 -05:00
parent 221ace2ff4
commit 9cc167ac6e

View File

@ -88,6 +88,7 @@ Contributions welcome. Add links through pull requests or create an issue to sta
- [An Agile Approach to Threat Modeling for Securing Open Source Project EdgeX Foundry](https://www.youtube.com/watch?v=iw-FzeKaj48)
- [Threat Modeling 101 (SAFECode On Demand Training Course)](https://www.youtube.com/watch?v=QQ7StGiy_-M)
## Tutorials and Blogs
*Tutorials and blogs that explain threat modeling*
@ -151,6 +152,11 @@ Contributions welcome. Add links through pull requests or create an issue to sta
- [Email Encryption Gateway Threat model by NCC Group](https://www.slideshare.net/NCC_Group/real-world-application-threat-modelling-by-example)
- [OWASP Threat Model Cookbook](https://github.com/OWASP/threat-model-cookbook)
- [Kubernetes Threat Model](https://github.com/kubernetes/community/tree/master/wg-security-audit/findings)
## Tools
@ -168,6 +174,8 @@ Contributions welcome. Add links through pull requests or create an issue to sta
- [Threatspec](https://threatspec.org/) - Threatspec is an open source project that aims to close the gap between development and security by bringing the threat modelling process further into the development process.
- [PyTM](https://github.com/izar/pytm) - PyTM is an open source project providing a library for threat modeling with code. Describe your system using OO syntax (object.property = value) and have your threat modeling report automatically generated.
### Paid tools
@ -183,6 +191,4 @@ Contributions welcome. Add links through pull requests or create an issue to sta
## Contributing
Please refer the guidelines at [contributing.md for details](contributing.md).
Please refer the guidelines at [contributing.md for details](Contributing.md).