Member-only story

Threat Modeling — Most Popular Methodology

agentred
4 min readDec 30, 2020

--

There are at least a dozen threat modeling methodologies in the market. In this article, I am trying to gauge the popularity of them.

Image by Darwin Laganzon from Pixabay

The Methodologies

Here is the list of methodologies, I am considering for my assessment —

  1. Attack Tree — This is one of the oldest methodologies which can be applied to a wide set of industries. It's based on conceptual diagrams showing how an asset, or target, might be attacked.
  2. OCTAVE — This approach is driven by operational risk and security practices and not technology. It was developed in 2001 at Carnegie Mellon University (CMU), for the United States Department of Defense.
  3. LINDDUN — This methodology helps in capturing and mitigating the privacy threats in software architectures. It was created in 2010 as a collaboration between the DistriNet and COSIC research groups of KU Leuven, Belgium.
  4. PASTA — The name is a mnemonic for Process for Attack Simulation and Threat Analysis. It provides a seven-step, risk-based approach to threat modeling. This methodology is intended to provide an attacker-centric view of the application and infrastructure. It was developed in 2012.
  5. STRIDE — This methodology was developed at Microsoft in 1999 for identifying computer security threats. It…

--

--

agentred
agentred

Written by agentred

Curiosity Crafted, Knowledge Unveiled !

No responses yet