- Module 1: Explore the four high-level steps of threat modeling.
- Understand the importance of capturing requirements and assumptions to help create a data-flow diagram
- Read about the framework that helps you find security issues in a system
- Learn about the security control categories that help you reduce or eliminate potential threats
- Highlight the importance of verifying assumptions, requirements, and fixes before deployment
- Module 2: Data-flow diagrams are graphical representations of your system and should specify each element, their interactions and context.
- Distinguish between the shape and function of each element
- Include the right context for an element when creating a data-flow diagram
- Module 3: Threat models can get complex if all parties involved cannot agree on a data-flow diagram depth layer that provides enough context to satisfy requirements
- Learn the differences between each data-flow diagram depth layer
- Know when to use them
- Module 4: Threat modeling is an effective technique to help you identify threats and ways to reduce or eliminate risk. We start by deciding to focus on either what needs to be protected or who it needs protection from.
- Define a system focused threat modeling exercise
- Explain the high-level differences between the system, asset, and attacker focused approaches
- Module 5: Threat modeling helps you generate a list of potential threats using STRIDE and find ways to reduce or eliminate risk with corresponding security controls.
- Discuss each threat category in the threat modeling framework
- Learn about the security controls to help reduce or eliminate risk
- Module 6: Threat modeling provides you with a list of threats and ways to reduce or eliminate risk, but it doesn't prioritize them for you. Also, there are no layered security control recommendations based on their type and function.
- Prioritize your issues
- Categorize security controls
- Understand each security control type and function
- Module 7: You can use any canvas, physical or virtual, to create a data-flow diagram. Engineers at Microsoft recommend three tools to help you in your threat modeling journey.
- Learn about the Threat Modeling Tool
- Learn more about Visio
In this module, you will be able to:
In this module, you will be able to:
In this module, you will be able to:
In this module, you will be able to:
In this module, you will be able to:
In this module, you will be able to:
In this module, you will be able to: