Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

Step 1: Choose the software application and the business feature to perform the threat modeling.

...

Step 2: answer the questions asked by the engine to proceed

...

Image Removed

Image Removed

Image Removed optional: click to get help from security knowledge base to further understand the weakness identified and how to remediate

Image Added

sample security knowledge base article

...

Step 3: At the end of the threat modeling, you can either save the result (the threat model) to Jira or visualize the attack tree generated by the engine

...

Sample attack tree

Image Added

sample Jira issue link (after you click “Save to Jira”)

...

Image Removed