Threat Modeling Methodologies
How to choose the right threat modeling methodology for your organization
Organizations are increasingly aware of the pressing need to bring threat modeling into their cyber security operations. In doing so, businesses can identify, understand and manage the threats they face, protecting them from the evolving threat landscape.
However, while organizations are conscious of the need to threat model, it can be daunting to know where to begin. This is in part due to the range of threat modeling methodologies that companies can make use of, as each is a unique approach and provides varied benefits.
Among these, the most common are STRIDE, OCTAVE, TRIKE AND PASTA. We will unpack these methodologies and how to assess which is right for your organization.
STRIDE: useful for analyzing systems and networks if adopters have a strong understanding of their threats.
OCTAVE: takes an operational approach as opposed to technological. Great for risk-focused teams.
TRIKE: open source approach based upon defense outlooks and techniques.
PASTA: a scalable option for collaboration across technical and compliance teams, to consider the probability of attacks.