Decoded: The Cybersecurity Podcast

OWASP Application Threat Modeling by Edward Henriquez


Listen Later

This OWASP document details a structured approach to application threat modeling. It outlines a four-step process: scoping the work, identifying threats (using methods like STRIDE), determining countermeasures and mitigation strategies, and assessing the completed work. The process emphasizes understanding the application from an attacker's perspective to proactively address security risks. Examples and templates are provided to guide users through each step, resulting in a comprehensive threat model document for the application. The document also explains how threat modeling complements code reviews.

...more
View all episodesView all episodes
Download on the App Store

Decoded: The Cybersecurity PodcastBy Edward Henriquez