By now Threat Modeling has become widely adopted as a “defacto” practice when building secure software. It’s no secret there are several threat modeling methodologies at Microsoft all tuned to their target audience. The SWI folks have one, PAG has another and ACE has another.
Learn more on Microsoft Application Security Threat Analysis & Modeling, Microsoft CAT.NET - code Analysis for .NET and Microsoft Spider - Technical Compliance Management from Mark Curphey
|