Threat Modeling
Identify threats and controls before building or deploying the surface.
- STRIDE / PASTA
- Attack surface
- Existing controls
Workshop + prioritized deliverable
runbook · threat-modeling
Secuencia ilustrativa bajo alcance acordado
- Coverage
- Critical flows, assets, trust boundaries, and design assumptions agreed with product and engineering.
- Typical deliverables
- Prioritized threat map, control gaps, and actionable recommendations for the backlog.
- Assumptions / modality
- Facilitated sessions on diagrams or existing documentation; no invasive testing.
