How Threat Modeling Enables Security by Design

How Threat Modeling Enables Security by Design


This IDC Perspective looks at the benefits of adopting threat modeling within into the application development life cycle and as an instrument within DevOps. Threat modeling can help identify threats (flaws) and countermeasures (security requirements). Security requirements help teams build security features to mitigate the identified threats.“With threat modeling, teams can build security features based on specific and documented security requirements during the design phase, before the application is deployed, right through to later phases in the DevOps development life cycle,” says Nick Kirtley, adjunct research advisor for IDC’s IT Executive Programs (IEP). “This provides measurable steps in developing the security of an application, which adds trust for customers, regulators, and other important stakeholders.”

Please Note: Extended description available upon request.


Executive Snapshot
Situation Overview
Adoption of Threat Modeling
Threat Modeling Tools
Preparing for Threat Modeling
Advice for the Technology Buyer
Learn More
Related Research
Synopsis

Download our eBook: How to Succeed Using Market Research

Learn how to effectively navigate the market research process to help guide your organization on the journey to success.

Download eBook
Cookie Settings