-
Book Overview & Buying
-
Table Of Contents
-
Feedback & Rating

Optimizing Your Modernization Journey with AWS
By :

The security pillar of the framework calls out threat modeling as a specific best practice for building a good foundation of secure workloads. As the complexity of IT systems is growing, integrating threat modeling into your application development life cycle becomes a crucial component to mitigate potential security threats bringing down your business value. The number of use cases adds to the complexity, making it ineffective to use ad hoc approaches to find and mitigate threats.
Threat modeling offers an approach that is systematic to capture the potential threats to a workload and implement mitigations to make sure the resources of your organization are not impacting your security posture. As you are equipped with the right resources to find and address issues early in the design process, the mitigations will result in a low cost when compared to doing the same later in the application development life cycle. Let us look at the core steps of threat modeling...
Change the font size
Change margin width
Change background colour