{"id":5113,"date":"2020-11-19T16:23:39","date_gmt":"2020-11-19T10:53:39","guid":{"rendered":"https:\/\/www.varutra.com\/?p=5113"},"modified":"2022-12-02T15:00:48","modified_gmt":"2022-12-02T09:30:48","slug":"threat-modelling-focused-defence-for-modern-enterprises","status":"publish","type":"post","link":"https:\/\/www.varutra.com\/varutravrt3\/threat-modelling-focused-defence-for-modern-enterprises\/","title":{"rendered":"Threat Modelling &#8211; Focused Defence for Modern Enterprises"},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" width=\"1920\" height=\"1080\" src=\"https:\/\/varutra-1a3b6.kxcdn.com\/wp-content\/uploads\/2020\/11\/Blog-AMP-Images-4-1024x535.png\"  class=\"sh-overlay-item sh-table-cell ls-is-cached lazyloaded\" data-rel=\"lightcase\" title=\"Threat Modelling Focused Defence for Modern Enterprises - Varutra Consulting\"><br \/>\nThreat modeling is creating a buzz that everyone wants to talk about it. Every organization wants to remodel its overhaul information. It will help them in producing a priority list for security improvements for their requirements, concepts, design, and implementation.<\/p>\n<p>&nbsp;<\/p>\n<h3><strong>Overview of Threat Modelling<\/strong><\/h3>\n<p>Hackers are constantly looking for any type of exposure to attack organizations. If the attempts are successful, then the organization\u2019s sensitive data are at risk. They can even prevent the systems and servers from properly functioning. As technology is growing, the threats are also evolving.<\/p>\n<p>&nbsp;<\/p>\n<h3><strong>What is this Threat Modelling everyone is talking about?<\/strong><\/h3>\n<p>Threat modeling is a means to identify, communicate, and understand threats. It includes architectural vulnerabilities, lack of appropriate safeguards, and mitigations. It helps create proper documentation with profiling on hackers and other attack vectors that will assist system analysts and defenders with better understanding and increase efficiency.<\/p>\n<p style=\"text-align: center\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-5114 size-full\" src=\"https:\/\/www.varutra.com\/wp-content\/uploads\/2020\/11\/Threat-Scenario.png\" alt=\"Threat Scenario\" width=\"606\" height=\"236\" srcset=\"https:\/\/www.varutra.com\/varutravrt3\/wp-content\/uploads\/2020\/11\/Threat-Scenario.png 606w, https:\/\/www.varutra.com\/varutravrt3\/wp-content\/uploads\/2020\/11\/Threat-Scenario-300x117.png 300w\" sizes=\"(max-width: 606px) 100vw, 606px\" \/><em>Fig: 1.0 Threat Scenario<\/em><\/p>\n<p>Implementation of threat modeling is possible in a variety of things like software applications, systems, networks, IoT, distributed systems, business processes, and much more. Though this procedure can be carried out at any development stage it is preferred to be done early at the design time.<\/p>\n<p>&nbsp;<\/p>\n<h3><strong>Process of Creating a Threat Model<\/strong><\/h3>\n<p>The procedure of threat modeling begins with the designing of a visual representation of an application or system analysis. There are two means of creating a visual representation.<\/p>\n<ul>\n<li>Visual Representation by Data Flow Diagram (DFD)<\/li>\n<\/ul>\n<p>DFDs are the tools that provide a high-level visualization of the application that works within the system to store, move or manipulate the data by system engineers. It has three core steps:<\/p>\n<ol>\n<li>View System as an adversary<\/li>\n<li>Characterize the system<\/li>\n<li>Determine the threats<\/li>\n<\/ol>\n<p>The threats determined by the DFD method are limited. So, it is considered to be a poor starting point for modeling and it is imprinted as a weakness. Some of them are listed below:<\/p>\n<ol>\n<li>They don\u2019t talk about the structure and stream of use.<\/li>\n<li>Their main focus is how information is being streamlined rather than client connectivity to the framework.<\/li>\n<\/ol>\n<p>Risk displays that are DFD-based do not have a standard methodology. It results in various individuals creating threat models with multiple outputs for a similar situation.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-5121 aligncenter\" src=\"https:\/\/www.varutra.com\/wp-content\/uploads\/2020\/11\/DFD-of-an-online-college-application-1.png\" alt=\"\" width=\"605\" height=\"362\" srcset=\"https:\/\/www.varutra.com\/varutravrt3\/wp-content\/uploads\/2020\/11\/DFD-of-an-online-college-application-1.png 605w, https:\/\/www.varutra.com\/varutravrt3\/wp-content\/uploads\/2020\/11\/DFD-of-an-online-college-application-1-300x180.png 300w\" sizes=\"(max-width: 605px) 100vw, 605px\" \/><\/p>\n<p style=\"text-align: center\">Fig: 1.1 DFD of an online college application<\/p>\n<ul>\n<li>Visual Representation by Process Flow Diagram (PFD)<\/li>\n<\/ul>\n<p>They are the tools that permit software developers to create threat models based on the application design process. It provides a visual representation specially designed for depicting a hacker&#8217;s thought process. Attackers do not analyze the data flow, but they may draw a roadmap on proceeding through different applications. PFD follows three core steps:<\/p>\n<ol>\n<li>Display of the application\u2019s used cases.<\/li>\n<li>Communication protocols are properly segregated. It helps the individual in moving between the used cases.<\/li>\n<li>Use cases are formed by collaborating various technical controls like cookies, sessions, forms, and other coding elements.<\/li>\n<\/ol>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-5132 aligncenter\" src=\"https:\/\/www.varutra.com\/wp-content\/uploads\/2020\/11\/PFD-of-an-online-banking-application.png\" alt=\"\" width=\"606\" height=\"445\" srcset=\"https:\/\/www.varutra.com\/varutravrt3\/wp-content\/uploads\/2020\/11\/PFD-of-an-online-banking-application.png 606w, https:\/\/www.varutra.com\/varutravrt3\/wp-content\/uploads\/2020\/11\/PFD-of-an-online-banking-application-300x220.png 300w\" sizes=\"(max-width: 606px) 100vw, 606px\" \/><\/p>\n<p style=\"text-align: center\">Fig: 1.2 PFD of an online banking application<\/p>\n<p>&nbsp;<\/p>\n<h3><strong>Threat Modelling Methodologies<\/strong><\/h3>\n<p>The methodology is required to model the threats independently of the attacker-centric, asset-centric, and software-centric. Here are the top three methods from which organizations can choose depending upon their project needs.<\/p>\n<h3 style=\"text-align: left\"><strong>1.STRIDE Methodology<\/strong><\/h3>\n<p>It is one of the primitive threat-modeling methods to be used. It was designed by Microsoft. It delivers an imprint for the basic set of threats that are categorized into six categories. They are:<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-5133 aligncenter\" src=\"https:\/\/www.varutra.com\/wp-content\/uploads\/2020\/11\/STRIDE-Threat-Categories.png\" alt=\"\" width=\"582\" height=\"170\" srcset=\"https:\/\/www.varutra.com\/varutravrt3\/wp-content\/uploads\/2020\/11\/STRIDE-Threat-Categories.png 582w, https:\/\/www.varutra.com\/varutravrt3\/wp-content\/uploads\/2020\/11\/STRIDE-Threat-Categories-300x88.png 300w\" sizes=\"(max-width: 582px) 100vw, 582px\" \/><\/p>\n<p style=\"text-align: center\">Fig: 1.3 STRIDE Threat Categories<\/p>\n<p>STRIDE performs system detail design evaluation. This procedure is carried by creating DFDs (Data Flow Diagram). It then identifies the system entities, events, and system boundaries. It is an easy to adopt method but is time-consuming. There is an issue of a rapid increase in threats as the system complexity increases.<\/p>\n<h3><strong>2. P.A.S.T.A. Methodology<\/strong><\/h3>\n<p>P.A.S.T.A. was designed in 2012, which is a risk-centric threat modeling framework. It is the abbreviation for Process for Attack Simulation and Threat Analysis. It is divided into seven categories. Each category is designed for multiple activities. They are:<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-5131 aligncenter\" src=\"https:\/\/www.varutra.com\/wp-content\/uploads\/2020\/11\/PASTA-Threat-Categories.png\" alt=\"\" width=\"582\" height=\"585\" srcset=\"https:\/\/www.varutra.com\/varutravrt3\/wp-content\/uploads\/2020\/11\/PASTA-Threat-Categories.png 582w, https:\/\/www.varutra.com\/varutravrt3\/wp-content\/uploads\/2020\/11\/PASTA-Threat-Categories-298x300.png 298w, https:\/\/www.varutra.com\/varutravrt3\/wp-content\/uploads\/2020\/11\/PASTA-Threat-Categories-150x150.png 150w\" sizes=\"(max-width: 582px) 100vw, 582px\" \/><\/p>\n<p style=\"text-align: center\">Fig: 1.4 PASTA Threat Categories<\/p>\n<p>he main function of P.A.S.T.A. is to bring technical prerequisites and business destinations together. Multiple plans and tools are used in different stages. Using this strategy, the threat modeling cycle is divided into many vital levels i.e., administration engineering, key decision-makers, acquiring security contribution from tasks, and improvement. P.A.S.T.A. is generally viewed as a risk-driven structure, and it utilizes viewpoint driven by an attacker to create an asset-driven output for threat scoring and identification.<\/p>\n<h3><strong>3. LINDDUN<\/strong><\/h3>\n<p>Its full form is Linkability, identifiability, nonrepudiation, detectability, disclosure of information, unawareness, noncompliance. It focuses on the user\u2019s privacy and data security. It consists of six core steps and provides a seamless approach towards privacy settlement.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-5130 aligncenter\" src=\"https:\/\/www.varutra.com\/wp-content\/uploads\/2020\/11\/LINDDUN-Methodology-Steps.png\" alt=\"\" width=\"585\" height=\"236\" srcset=\"https:\/\/www.varutra.com\/varutravrt3\/wp-content\/uploads\/2020\/11\/LINDDUN-Methodology-Steps.png 585w, https:\/\/www.varutra.com\/varutravrt3\/wp-content\/uploads\/2020\/11\/LINDDUN-Methodology-Steps-300x121.png 300w\" sizes=\"(max-width: 585px) 100vw, 585px\" \/><\/p>\n<p style=\"text-align: center\">Fig: 1.5 LINDDUN Methodology Steps<\/p>\n<p>The LINDDUN process begins with a DND of the system where it explains the system\u2019s information flow, data storage, external entities, and procedures. LINDDUN users can easily distinguish threat appropriateness in the framework and then build threat trees by deliberately repeating every model component and breaking them down from their respective threat classifications.<\/p>\n<p>&nbsp;<\/p>\n<h3><strong>Conclusion<\/strong><\/h3>\n<p>Threat modeling makes your item more reliable and secure. It displays significant risk demonstration techniques and procedures. They can be used for individual purposes as well as for others. There are instances where multiple strategies are combined. To perform threat modeling, you need to be clear about your target (risk, security, and privacy), to what extent you need to carry out this process, your experience with it, how deeply your partners are to be included in the spry environment, contingent time for running and how frequently the modeling is rehashed.<\/p>\n<p>We offer several cybersecurity services to counter these cyber-attacks and risks. Services like\u00a0<a href=\"https:\/\/www.varutra.com\/audit-compliance\/\">Audit and Compliance<\/a>,\u00a0<a href=\"https:\/\/www.varutra.com\/soc-and-global-threat-management-services\/\">SOC and Global Threat Management Services<\/a>,\u00a0<a href=\"https:\/\/www.varutra.com\/information-security-maturity-assessment\/\">Information Security Maturity Assessment<\/a>,\u00a0<a href=\"https:\/\/www.varutra.com\/special-security-services\/\">Special Security Services<\/a>, and much more. Our tailored security services will help organizations secure their information and enhance their defensive security systems.<\/p>\n<p>&nbsp;<\/p>\n<h3><strong>References:<\/strong><\/h3>\n<ul>\n<li><a href=\"https:\/\/www.cs.montana.edu\/courses\/csci476\/topics\/threat_modeling.pdf\">https:\/\/www.cs.montana.edu\/courses\/csci476\/topics\/threat_modeling.pdf<\/a><\/li>\n<li><a href=\"https:\/\/resources.sei.cmu.edu\/asset_files\/WhitePaper\/2018_019_001_524597.pdf\">https:\/\/resources.sei.cmu.edu\/asset_files\/WhitePaper\/2018_019_001_524597.pdf<\/a><\/li>\n<li><a href=\"https:\/\/threatmodeler.com\/wp-content\/uploads\/2017\/08\/Online-Banking-Application-Threat-Model-v2-e1523416136759.jpg\">https:\/\/threatmodeler.com\/wp-content\/uploads\/2017\/08\/Online-Banking-Application-Threat-Model-v2-e1523416136759.jpg<\/a><\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<p>Author,<\/p>\n<p><em><strong>Sankalp Mahajan<\/strong><\/em><\/p>\n<p><em>Attack &amp; Pen Test Team<\/em><\/p>\n<p><em>Varutra Consulting Pvt. Ltd.<\/em><\/p>","protected":false},"excerpt":{"rendered":"<p>Threat modeling is creating a buzz that everyone wants to talk about it. Every organization wants to remodel its overhaul information. It will help them&#8230;<\/p>\n","protected":false},"author":4,"featured_media":18160,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"om_disable_all_campaigns":false,"inline_featured_image":false,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"categories":[285,273],"tags":[301,298,302,300,299,297],"aioseo_notices":[],"aioseo_head":"\n\t\t<!-- All in One SEO Pro 4.6.3 - aioseo.com -->\n\t\t<meta name=\"description\" content=\"The function of threat modelling is to identify, communicate, understand threats, and mitigation within the framework to secure the information.\" \/>\n\t\t<meta name=\"robots\" content=\"max-image-preview:large\" \/>\n\t\t<link rel=\"canonical\" href=\"https:\/\/www.varutra.com\/varutravrt3\/threat-modelling-focused-defence-for-modern-enterprises\/\" \/>\n\t\t<meta name=\"generator\" content=\"All in One SEO Pro (AIOSEO) 4.6.3\" \/>\n\t\t<meta property=\"og:locale\" content=\"en_US\" \/>\n\t\t<meta property=\"og:site_name\" content=\"Varutra Consulting\" \/>\n\t\t<meta property=\"og:type\" content=\"article\" \/>\n\t\t<meta property=\"og:title\" content=\"Threat Modelling - Focused Defence for Modern Enterprises\" \/>\n\t\t<meta property=\"og:description\" content=\"The function of threat modelling is to identify, communicate, understand threats, and mitigation within the framework to secure the information.\" \/>\n\t\t<meta property=\"og:url\" content=\"https:\/\/www.varutra.com\/varutravrt3\/threat-modelling-focused-defence-for-modern-enterprises\/\" \/>\n\t\t<meta property=\"og:image\" content=\"https:\/\/www.varutra.com\/wp-content\/uploads\/2020\/11\/Blog-AMP-Images-4.png\" \/>\n\t\t<meta property=\"og:image:secure_url\" content=\"https:\/\/www.varutra.com\/wp-content\/uploads\/2020\/11\/Blog-AMP-Images-4.png\" \/>\n\t\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t\t<meta property=\"og:image:height\" content=\"627\" \/>\n\t\t<meta property=\"article:section\" content=\"Secure SDLC\" \/>\n\t\t<meta property=\"article:tag\" content=\"process for attack simulation and threat analysis\" \/>\n\t\t<meta property=\"article:tag\" content=\"sdlc\" \/>\n\t\t<meta property=\"article:tag\" content=\"stride methodology\" \/>\n\t\t<meta property=\"article:tag\" content=\"threat analysis\" \/>\n\t\t<meta property=\"article:tag\" content=\"threat hunting\" \/>\n\t\t<meta property=\"article:tag\" content=\"threat modelling\" \/>\n\t\t<meta property=\"article:published_time\" content=\"2020-11-19T10:53:39+00:00\" \/>\n\t\t<meta property=\"article:modified_time\" content=\"2022-12-02T09:30:48+00:00\" \/>\n\t\t<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n\t\t<meta name=\"twitter:title\" content=\"Threat Modelling - Focused Defence for Modern Enterprises\" \/>\n\t\t<meta name=\"twitter:description\" content=\"The function of threat modelling is to identify, communicate, understand threats, and mitigation within the framework to secure the information.\" \/>\n\t\t<meta name=\"twitter:image\" content=\"https:\/\/www.varutra.com\/wp-content\/uploads\/2020\/11\/Blog-AMP-Images-4.png\" \/>\n\t\t<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t\t<meta name=\"twitter:data1\" content=\"kalpblogger\" \/>\n\t\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n\t\t<script type=\"application\/ld+json\" class=\"aioseo-schema\">\n\t\t\t{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/threat-modelling-focused-defence-for-modern-enterprises\\\/#article\",\"name\":\"Threat Modelling - Focused Defence for Modern Enterprises\",\"headline\":\"Threat Modelling &#8211; Focused Defence for Modern Enterprises\",\"author\":{\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/author\\\/kalpblogger\\\/#author\"},\"publisher\":{\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/#organization\"},\"image\":{\"@type\":\"ImageObject\",\"url\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/wp-content\\\/uploads\\\/2020\\\/11\\\/Blog-AMP-Images-4.png\",\"width\":1200,\"height\":627,\"caption\":\"Threat Modelling - Focused Defence for Modern Enterprises\"},\"datePublished\":\"2020-11-19T16:23:39+05:30\",\"dateModified\":\"2022-12-02T15:00:48+05:30\",\"inLanguage\":\"en-US\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/threat-modelling-focused-defence-for-modern-enterprises\\\/#webpage\"},\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/threat-modelling-focused-defence-for-modern-enterprises\\\/#webpage\"},\"articleSection\":\"Secure SDLC, Security Best Practices, Process for Attack Simulation and Threat Analysis, SDLC, STRIDE Methodology, Threat Analysis, Threat hunting, Threat Modelling\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/threat-modelling-focused-defence-for-modern-enterprises\\\/#breadcrumblist\",\"itemListElement\":[{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/#listItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/\",\"nextItem\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/threat-modelling-focused-defence-for-modern-enterprises\\\/#listItem\"},{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/threat-modelling-focused-defence-for-modern-enterprises\\\/#listItem\",\"position\":2,\"name\":\"Threat Modelling - Focused Defence for Modern Enterprises\",\"previousItem\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/#listItem\"}]},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/#organization\",\"name\":\"Varutra\",\"url\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"url\":\"https:\\\/\\\/www.varutra.com\\\/wp-content\\\/uploads\\\/2021\\\/11\\\/Varutra-Found-e1612984024606.jpg\",\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/threat-modelling-focused-defence-for-modern-enterprises\\\/#organizationLogo\"},\"image\":{\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/threat-modelling-focused-defence-for-modern-enterprises\\\/#organizationLogo\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/author\\\/kalpblogger\\\/#author\",\"url\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/author\\\/kalpblogger\\\/\",\"name\":\"kalpblogger\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/threat-modelling-focused-defence-for-modern-enterprises\\\/#authorImage\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/5e96a9b330da7c941c1e39217a2fbe38?s=96&d=mm&r=g\",\"width\":96,\"height\":96,\"caption\":\"kalpblogger\"}},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/threat-modelling-focused-defence-for-modern-enterprises\\\/#webpage\",\"url\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/threat-modelling-focused-defence-for-modern-enterprises\\\/\",\"name\":\"Threat Modelling - Focused Defence for Modern Enterprises\",\"description\":\"The function of threat modelling is to identify, communicate, understand threats, and mitigation within the framework to secure the information.\",\"inLanguage\":\"en-US\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/#website\"},\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/threat-modelling-focused-defence-for-modern-enterprises\\\/#breadcrumblist\"},\"author\":{\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/author\\\/kalpblogger\\\/#author\"},\"creator\":{\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/author\\\/kalpblogger\\\/#author\"},\"image\":{\"@type\":\"ImageObject\",\"url\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/wp-content\\\/uploads\\\/2020\\\/11\\\/Blog-AMP-Images-4.png\",\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/threat-modelling-focused-defence-for-modern-enterprises\\\/#mainImage\",\"width\":1200,\"height\":627,\"caption\":\"Threat Modelling - Focused Defence for Modern Enterprises\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/threat-modelling-focused-defence-for-modern-enterprises\\\/#mainImage\"},\"datePublished\":\"2020-11-19T16:23:39+05:30\",\"dateModified\":\"2022-12-02T15:00:48+05:30\"},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/#website\",\"url\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/\",\"name\":\"Varutra Consulting\",\"description\":\"Secure your digital world with our Cybersecurity services.\",\"inLanguage\":\"en-US\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/#organization\"}}]}\n\t\t<\/script>\n\t\t<!-- All in One SEO Pro -->\r\n\t\t<title>Threat Modelling - Focused Defence for Modern Enterprises<\/title>\n\n","aioseo_head_json":{"title":"Threat Modelling - Focused Defence for Modern Enterprises","description":"The function of threat modelling is to identify, communicate, understand threats, and mitigation within the framework to secure the information.","canonical_url":"https:\/\/www.varutra.com\/varutravrt3\/threat-modelling-focused-defence-for-modern-enterprises\/","robots":"max-image-preview:large","keywords":"","webmasterTools":{"miscellaneous":""},"og:locale":"en_US","og:site_name":"Varutra Consulting","og:type":"article","og:title":"Threat Modelling - Focused Defence for Modern Enterprises","og:description":"The function of threat modelling is to identify, communicate, understand threats, and mitigation within the framework to secure the information.","og:url":"https:\/\/www.varutra.com\/varutravrt3\/threat-modelling-focused-defence-for-modern-enterprises\/","og:image":"https:\/\/www.varutra.com\/wp-content\/uploads\/2020\/11\/Blog-AMP-Images-4.png","og:image:secure_url":"https:\/\/www.varutra.com\/wp-content\/uploads\/2020\/11\/Blog-AMP-Images-4.png","og:image:width":"1200","og:image:height":"627","article:section":"Secure SDLC","article:tag":["process for attack simulation and threat analysis","sdlc","stride methodology","threat analysis","threat hunting","threat modelling"],"article:published_time":"2020-11-19T10:53:39+00:00","article:modified_time":"2022-12-02T09:30:48+00:00","twitter:card":"summary_large_image","twitter:title":"Threat Modelling - Focused Defence for Modern Enterprises","twitter:description":"The function of threat modelling is to identify, communicate, understand threats, and mitigation within the framework to secure the information.","twitter:image":"https:\/\/www.varutra.com\/wp-content\/uploads\/2020\/11\/Blog-AMP-Images-4.png","twitter:label1":"Written by","twitter:data1":"kalpblogger","twitter:label2":"Est. reading time","twitter:data2":"5 minutes","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.varutra.com\/varutravrt3\/threat-modelling-focused-defence-for-modern-enterprises\/#article","name":"Threat Modelling - Focused Defence for Modern Enterprises","headline":"Threat Modelling &#8211; Focused Defence for Modern Enterprises","author":{"@id":"https:\/\/www.varutra.com\/varutravrt3\/author\/kalpblogger\/#author"},"publisher":{"@id":"https:\/\/www.varutra.com\/varutravrt3\/#organization"},"image":{"@type":"ImageObject","url":"https:\/\/www.varutra.com\/varutravrt3\/wp-content\/uploads\/2020\/11\/Blog-AMP-Images-4.png","width":1200,"height":627,"caption":"Threat Modelling - Focused Defence for Modern Enterprises"},"datePublished":"2020-11-19T16:23:39+05:30","dateModified":"2022-12-02T15:00:48+05:30","inLanguage":"en-US","mainEntityOfPage":{"@id":"https:\/\/www.varutra.com\/varutravrt3\/threat-modelling-focused-defence-for-modern-enterprises\/#webpage"},"isPartOf":{"@id":"https:\/\/www.varutra.com\/varutravrt3\/threat-modelling-focused-defence-for-modern-enterprises\/#webpage"},"articleSection":"Secure SDLC, Security Best Practices, Process for Attack Simulation and Threat Analysis, SDLC, STRIDE Methodology, Threat Analysis, Threat hunting, Threat Modelling"},{"@type":"BreadcrumbList","@id":"https:\/\/www.varutra.com\/varutravrt3\/threat-modelling-focused-defence-for-modern-enterprises\/#breadcrumblist","itemListElement":[{"@type":"ListItem","@id":"https:\/\/www.varutra.com\/varutravrt3\/#listItem","position":1,"name":"Home","item":"https:\/\/www.varutra.com\/varutravrt3\/","nextItem":"https:\/\/www.varutra.com\/varutravrt3\/threat-modelling-focused-defence-for-modern-enterprises\/#listItem"},{"@type":"ListItem","@id":"https:\/\/www.varutra.com\/varutravrt3\/threat-modelling-focused-defence-for-modern-enterprises\/#listItem","position":2,"name":"Threat Modelling - Focused Defence for Modern Enterprises","previousItem":"https:\/\/www.varutra.com\/varutravrt3\/#listItem"}]},{"@type":"Organization","@id":"https:\/\/www.varutra.com\/varutravrt3\/#organization","name":"Varutra","url":"https:\/\/www.varutra.com\/varutravrt3\/","logo":{"@type":"ImageObject","url":"https:\/\/www.varutra.com\/wp-content\/uploads\/2021\/11\/Varutra-Found-e1612984024606.jpg","@id":"https:\/\/www.varutra.com\/varutravrt3\/threat-modelling-focused-defence-for-modern-enterprises\/#organizationLogo"},"image":{"@id":"https:\/\/www.varutra.com\/varutravrt3\/threat-modelling-focused-defence-for-modern-enterprises\/#organizationLogo"}},{"@type":"Person","@id":"https:\/\/www.varutra.com\/varutravrt3\/author\/kalpblogger\/#author","url":"https:\/\/www.varutra.com\/varutravrt3\/author\/kalpblogger\/","name":"kalpblogger","image":{"@type":"ImageObject","@id":"https:\/\/www.varutra.com\/varutravrt3\/threat-modelling-focused-defence-for-modern-enterprises\/#authorImage","url":"https:\/\/secure.gravatar.com\/avatar\/5e96a9b330da7c941c1e39217a2fbe38?s=96&d=mm&r=g","width":96,"height":96,"caption":"kalpblogger"}},{"@type":"WebPage","@id":"https:\/\/www.varutra.com\/varutravrt3\/threat-modelling-focused-defence-for-modern-enterprises\/#webpage","url":"https:\/\/www.varutra.com\/varutravrt3\/threat-modelling-focused-defence-for-modern-enterprises\/","name":"Threat Modelling - Focused Defence for Modern Enterprises","description":"The function of threat modelling is to identify, communicate, understand threats, and mitigation within the framework to secure the information.","inLanguage":"en-US","isPartOf":{"@id":"https:\/\/www.varutra.com\/varutravrt3\/#website"},"breadcrumb":{"@id":"https:\/\/www.varutra.com\/varutravrt3\/threat-modelling-focused-defence-for-modern-enterprises\/#breadcrumblist"},"author":{"@id":"https:\/\/www.varutra.com\/varutravrt3\/author\/kalpblogger\/#author"},"creator":{"@id":"https:\/\/www.varutra.com\/varutravrt3\/author\/kalpblogger\/#author"},"image":{"@type":"ImageObject","url":"https:\/\/www.varutra.com\/varutravrt3\/wp-content\/uploads\/2020\/11\/Blog-AMP-Images-4.png","@id":"https:\/\/www.varutra.com\/varutravrt3\/threat-modelling-focused-defence-for-modern-enterprises\/#mainImage","width":1200,"height":627,"caption":"Threat Modelling - Focused Defence for Modern Enterprises"},"primaryImageOfPage":{"@id":"https:\/\/www.varutra.com\/varutravrt3\/threat-modelling-focused-defence-for-modern-enterprises\/#mainImage"},"datePublished":"2020-11-19T16:23:39+05:30","dateModified":"2022-12-02T15:00:48+05:30"},{"@type":"WebSite","@id":"https:\/\/www.varutra.com\/varutravrt3\/#website","url":"https:\/\/www.varutra.com\/varutravrt3\/","name":"Varutra Consulting","description":"Secure your digital world with our Cybersecurity services.","inLanguage":"en-US","publisher":{"@id":"https:\/\/www.varutra.com\/varutravrt3\/#organization"}}]}},"aioseo_meta_data":{"post_id":"5113","title":"Threat Modelling - Focused Defence for Modern Enterprises","description":"The function of threat modelling is to identify, communicate, understand threats, and mitigation within the framework to secure the information.","keywords":[],"keyphrases":"{\"focus\":{\"keyphrase\":\"Threat Modelling\",\"analysis\":{\"keyphraseInTitle\":{\"title\":\"Focus keyphrase in SEO title\",\"description\":\"Focus keyphrase found in SEO title.\",\"score\":9,\"maxScore\":9,\"error\":0},\"keyphraseInDescription\":{\"title\":\"Focus keyphrase in meta description\",\"description\":\"Focus keyphrase found in meta description.\",\"score\":9,\"maxScore\":9,\"error\":0},\"keyphraseLength\":{\"title\":\"Focus keyphrase length\",\"description\":\"Good job!\",\"score\":9,\"maxScore\":9,\"error\":0,\"length\":2},\"keyphraseInURL\":{\"title\":\"Focus keyphrase in URL\",\"description\":\"Focus keyphrase used in the URL.\",\"score\":5,\"maxScore\":5,\"error\":0},\"keyphraseInIntroduction\":{\"title\":\"Focus keyphrase in introduction\",\"description\":\"Your Focus keyphrase does not appear in the first paragraph. Make sure the topic is clear immediately.\",\"score\":3,\"maxScore\":9,\"error\":1},\"keyphraseInSubHeadings\":{\"title\":\"Focus keyphrase in Subheadings\",\"description\":\"Your H2 and H3 subheadings reflects the topic of your copy. Good job!\",\"score\":9,\"maxScore\":9,\"error\":0},\"keyphraseInImageAlt\":{\"title\":\"Focus keyphrase in image alt attributes\",\"description\":\"Focus keyphrase not found in image alt attribute(s). Add an image with your Focus keyphrase as alt text.\",\"score\":3,\"maxScore\":9,\"error\":1}},\"score\":80},\"additional\":[{\"keyphrase\":\"Threat\",\"score\":100,\"analysis\":{\"keyphraseInDescription\":{\"title\":\"Keyphrase in meta description\",\"description\":\"Keyphrase found in meta description.\",\"score\":9,\"maxScore\":9,\"error\":0},\"keyphraseLength\":{\"title\":\"Keyphrase length\",\"description\":\"Good job!\",\"score\":9,\"maxScore\":9,\"error\":0,\"length\":1},\"keyphraseInIntroduction\":{\"title\":\"Keyphrase in introduction\",\"description\":\"Your Keyphrase appears in the first paragraph. Well done!\",\"score\":9,\"maxScore\":9,\"error\":0},\"keyphraseInImageAlt\":{\"title\":\"Keyphrase in image alt attributes\",\"description\":\"Keyphrase found in image alt attribute(s).\",\"score\":9,\"maxScore\":9,\"error\":0}}}]}","primary_term":null,"canonical_url":null,"og_title":null,"og_description":null,"og_object_type":"default","og_image_type":"featured","og_image_url":"https:\/\/www.varutra.com\/wp-content\/uploads\/2020\/11\/Blog-AMP-Images-4.png","og_image_width":"1200","og_image_height":"627","og_image_custom_url":null,"og_image_custom_fields":null,"og_video":"","og_custom_url":null,"og_article_section":"Secure SDLC","og_article_tags":[],"twitter_use_og":true,"twitter_card":"default","twitter_image_type":"default","twitter_image_url":null,"twitter_image_custom_url":null,"twitter_image_custom_fields":null,"twitter_title":null,"twitter_description":null,"schema":{"blockGraphs":[],"customGraphs":[],"default":{"data":{"Article":[],"Course":[],"Dataset":[],"FAQPage":[],"Movie":[],"Person":[],"Product":[],"Recipe":[],"Service":[],"SoftwareApplication":[],"WebPage":[]},"graphName":"","isEnabled":true},"graphs":[]},"schema_type":"default","schema_type_options":"{\"article\":{\"articleType\":\"BlogPosting\"},\"course\":{\"name\":\"\",\"description\":\"\",\"provider\":\"\"},\"faq\":{\"pages\":[]},\"product\":{\"reviews\":[]},\"recipe\":{\"ingredients\":[],\"instructions\":[],\"keywords\":[]},\"software\":{\"reviews\":[],\"operatingSystems\":[]},\"webPage\":{\"webPageType\":\"WebPage\"}}","pillar_content":false,"robots_default":true,"robots_noindex":false,"robots_noarchive":false,"robots_nosnippet":false,"robots_nofollow":false,"robots_noimageindex":false,"robots_noodp":false,"robots_notranslate":false,"robots_max_snippet":"-1","robots_max_videopreview":"-1","robots_max_imagepreview":"large","priority":null,"frequency":"default","local_seo":null,"limit_modified_date":false,"open_ai":null,"created":"2021-10-27 15:12:31","updated":"2022-12-02 09:45:09"},"aioseo_breadcrumb":"<div class=\"aioseo-breadcrumbs\"><span class=\"aioseo-breadcrumb\">\n\t<a href=\"https:\/\/www.varutra.com\/varutravrt3\" title=\"Home\">Home<\/a>\n<\/span><span class=\"aioseo-breadcrumb-separator\">&raquo;<\/span><span class=\"aioseo-breadcrumb\">\n\t<a href=\"https:\/\/www.varutra.com\/varutravrt3\/category\/secure-sdlc\/\" title=\"Secure SDLC\">Secure SDLC<\/a>\n<\/span><span class=\"aioseo-breadcrumb-separator\">&raquo;<\/span><span class=\"aioseo-breadcrumb\">\n\tThreat Modelling \u2013 Focused Defence for Modern Enterprises\n<\/span><\/div>","aioseo_breadcrumb_json":[{"label":"Home","link":"https:\/\/www.varutra.com\/varutravrt3"},{"label":"Secure SDLC","link":"https:\/\/www.varutra.com\/varutravrt3\/category\/secure-sdlc\/"},{"label":"Threat Modelling &#8211; Focused Defence for Modern Enterprises","link":"https:\/\/www.varutra.com\/varutravrt3\/threat-modelling-focused-defence-for-modern-enterprises\/"}],"post_mailing_queue_ids":[],"_links":{"self":[{"href":"https:\/\/www.varutra.com\/varutravrt3\/wp-json\/wp\/v2\/posts\/5113"}],"collection":[{"href":"https:\/\/www.varutra.com\/varutravrt3\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.varutra.com\/varutravrt3\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.varutra.com\/varutravrt3\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.varutra.com\/varutravrt3\/wp-json\/wp\/v2\/comments?post=5113"}],"version-history":[{"count":5,"href":"https:\/\/www.varutra.com\/varutravrt3\/wp-json\/wp\/v2\/posts\/5113\/revisions"}],"predecessor-version":[{"id":20334,"href":"https:\/\/www.varutra.com\/varutravrt3\/wp-json\/wp\/v2\/posts\/5113\/revisions\/20334"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.varutra.com\/varutravrt3\/wp-json\/wp\/v2\/media\/18160"}],"wp:attachment":[{"href":"https:\/\/www.varutra.com\/varutravrt3\/wp-json\/wp\/v2\/media?parent=5113"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.varutra.com\/varutravrt3\/wp-json\/wp\/v2\/categories?post=5113"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.varutra.com\/varutravrt3\/wp-json\/wp\/v2\/tags?post=5113"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}