
How Threat Modeling Enables Security by Design
Description
How Threat Modeling Enables Security by Design
This IDC Perspective looks at the benefits of adopting threat modeling within into the application development life cycle and as an instrument within DevOps. Threat modeling can help identify threats (flaws) and countermeasures (security requirements). Security requirements help teams build security features to mitigate the identified threats.“With threat modeling, teams can build security features based on specific and documented security requirements during the design phase, before the application is deployed, right through to later phases in the DevOps development life cycle,” says Nick Kirtley, adjunct research advisor for IDC’s IT Executive Programs (IEP). “This provides measurable steps in developing the security of an application, which adds trust for customers, regulators, and other important stakeholders.”
Please Note: Extended description available upon request.
Table of Contents
8 Pages
- Executive Snapshot
- Situation Overview
- Adoption of Threat Modeling
- Threat Modeling Tools
- Preparing for Threat Modeling
- Advice for the Technology Buyer
- Learn More
- Related Research
- Synopsis
Pricing
Currency Rates
Questions or Comments?
Our team has the ability to search within reports to verify it suits your needs. We can also help maximize your budget by finding sections of reports you can purchase.