Report cover image

How Threat Modeling Enables Security by Design

Publisher IDC
Published Feb 14, 2024
Length 8 Pages
SKU # IDC18540150

Description

How Threat Modeling Enables Security by Design


This IDC Perspective looks at the benefits of adopting threat modeling within into the application development life cycle and as an instrument within DevOps. Threat modeling can help identify threats (flaws) and countermeasures (security requirements). Security requirements help teams build security features to mitigate the identified threats.“With threat modeling, teams can build security features based on specific and documented security requirements during the design phase, before the application is deployed, right through to later phases in the DevOps development life cycle,” says Nick Kirtley, adjunct research advisor for IDC’s IT Executive Programs (IEP). “This provides measurable steps in developing the security of an application, which adds trust for customers, regulators, and other important stakeholders.”

Please Note: Extended description available upon request.

Table of Contents

8 Pages
Executive Snapshot
Situation Overview
Adoption of Threat Modeling
Threat Modeling Tools
Preparing for Threat Modeling
Advice for the Technology Buyer
Learn More
Related Research
Synopsis
How Do Licenses Work?
Head shot

Questions or Comments?

Our team has the ability to search within reports to verify it suits your needs. We can also help maximize your budget by finding sections of reports you can purchase.