Threat Modeling

To be written

See also

Work and data flows

  • identify what assets the team owns
  • identify what data is in them
  • map the flow of data
  • classify the data
  • mitigate the highest risk first