Skip to content

scmdr/5-Step-threat-modelin-process-to-improve-resiliency-identity-close-gaps-

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

2 Commits
 
 

Repository files navigation

5-Step-threat-modelin-process-to-improve-resiliency-identity-close-gaps-

1.What am I concerned about?

Select a digital asset-Digital Assets Includes: Systems, Processes, data, technology.

  1. What could fo wrong?

Identify attack scenarios: Attackers & thier tactics, techniques, procedures. identify available detection methods.

  1. What can protected from attacks?

Check existing controls: Preventive, detective & administrative controls. Check adequacy & effectiveness.

  1. Is Protection sufficient?

Estimate residual risk: Cummulative risk for business interuption, regulatory fines, data loss & brand impact.

  1. How do I justly cost for action?

Build business case: Add new controls, improve effectiveness, replace with better controls. Cost of doing vs cost of not doing?

About

No description, website, or topics provided.

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published