@@ -27,16 +27,16 @@ This may be assembled into a single threat model document; a structured represen
2727that affects the security of an application.
2828In essence, it is a view of the application and its environment through security glasses.
2929
30- Threat modeling is a process for capturing, organizing, and analyzing all of this information.
30+ Threat modeling is a process for capturing, organizing, and analyzing all of this information
3131and enables informed decision-making about application security risk.
3232In addition to producing a model, typical threat modeling efforts also produce a prioritized list
3333of _ potential_ security vulnerabilities in the concept, requirements, design, or implementation.
3434Any potential vulnerabilities that have been identified from the model should then be remediated
3535using one of the common strategies: mitigate, eliminate, transfer or accept the threat of being exploited.
3636
3737There are many reasons for doing threat modeling but the most important one is that this activity is _ useful_ ,
38- it is probably the only stage in a development lifecycle where a team sits back and asks:
39- 'What can go wrong?'
38+ it is probably the only stage in a development lifecycle where a team sits back and asks: 'What can go wrong?'.
39+
4040There are other reasons for threat modeling, for example standards compliance or analysis for disaster recovery,
4141but the main aim of threat modeling is to remedy (possible) vulnerabilities before the malicious actors can exploit them.
4242
@@ -84,7 +84,7 @@ The inclusion of threat modeling in the secure development activities can help:
8484 a malicious actor, accidents, or other causes of impact
8585* Identification of security test cases / security test scenarios to test the security requirements
8686
87- Threat modeling also provides a clear “ line of sight” across a project that can be used
87+ Threat modeling also provides a clear ' line of sight' across a project that can be used
8888to justify other security efforts.
8989The threat model allows security decisions to be made rationally, with all the information available,
9090so that security decisions can be properly supported.
@@ -107,7 +107,7 @@ As more details are added to the system new attack vectors are identified,
107107so the ongoing threat modeling process should examine, diagnose, and address these threats.
108108
109109Note that it is a natural part of refining a system for new threats to be exposed.
110- For example, when you select a particular technology, such as Java for example,
110+ When you select a particular technology, such as Java for example,
111111you take on the responsibility to identify the new threats that are created by that choice.
112112Even implementation choices such as using regular expressions for validation
113113introduce potential new threats to deal with.
@@ -183,7 +183,7 @@ all perfectly valid, so choose the right process that works for a specific team.
183183
184184#### Final advice
185185
186- Finally some advice on threat modeling.
186+ Some final words on threat modeling.
187187
188188** Make it incremental** :
189189
@@ -207,7 +207,7 @@ but also allow teams to choose how they record their threat models.
207207If one team decides to use Threat Dragon, for example, and another wants to use a drawing board,
208208then that is usually fine.
209209The discussions had during the threat modeling process are more important than the tool used,
210- although you might ask the team using the drawing board how they implement their change control.
210+ although you might ask the team using the drawing board how they implement change control for their models .
211211
212212** Brevity is paramount** :
213213
@@ -222,8 +222,8 @@ malicious actors (external or internal) trying to subvert your system.
222222
223223It is a good strategy to choose a threat categorisation methodology for the whole organisation
224224and then try and keep to it.
225- This could be [ STRIDE] [ stride ] or [ LINDDUN] [ linddun ] , but if the [ CIA] [ cia ] triad gives enough granularity
226- then that is a perfectly good choice.
225+ For example this could be [ STRIDE] [ stride ] or [ LINDDUN] [ linddun ] , but if the [ CIA] [ cia ] triad provides enough granularity
226+ then that is also a perfectly good choice.
227227
228228#### Further reading
229229
0 commit comments