![]() It covers a few of the more useful tools to encourage you to think about the tools you already use and with which you are familiar. This section discusses tools that are not specialized for threat modeling but can be tremendously useful. The chapter closes with a few words about tools that don't yet exist. You'll then learn about the open-source tools that are available, followed by commercial tools. This chapter starts by describing some generally useful tools and how to apply them to threat modeling. (Those are treated at greater length, because there's less risk of me insulting the authors.) ![]() Some trade-offs are unavoidable as tools are created, so the chapter starts with general tools that are useful in threat modeling, and then progresses to more specialized tools.Ī few disclosures: I do not have personal experience with each tool described here, and some of the tools I created myself. Or you might find that a tool cramps your style. You may find yourself stymied by usability issues, such as fields you're unsure how to fill out. Finally, tools can help you create actionable output from a threat model. Tools can help you check your threat model for completeness. Tools can help create a more legible or even beautiful threat model document. Tools can help you remember to engage in various steps, or provide assistance performing those steps. It can help you create better models, or create models more fluidly. ![]() Tooling can help threat modeling in a number of ways. ![]() This chapter covers tools to help you threat model. Managing and Addressing Threats Chapter 11. Threat Modeling: Designing for Security (2014) Part III. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |