The importance of documenting and using threat models in cybersecurity and DevOps
- Threat models should be stored and available in places that people know where to find them and how to relate and change them
- Threat models can be used to define security contracts and find commonalities for platforming
- Templates are useful for making threat models consistent and easy to compare
- Everyday tools can be used for automating boring parts of the system and dealing with low hanging fruit
- Threat models are living documents that should be updated and stored for future use