tplat

    • GitHub
    • Resume

    Identify

    • Identify

    Identify#

    Once you have a model of your system, you are well positioned to begin identifying threats. There are several tools designed to help with this, namely:

    • STRIDE
    • Elevation of Privelege
    • Brainstorming
    Backward Trust Boundaries STRIDE Forward
    • Identify