CyberSage, Threat Modeling Automation

Skip to end of metadata
Go to start of metadata

You are viewing an old version of this page. View the current version.

Compare with Current View Page History

« Previous Version 7 Current »

What CyberSage Delivers.

CyberSage provides Threat Modeling as an on-demand service to developers and architects so they can understand the potential exploitable security weakness (Threat Model) in the software and system design. Further more, CyberSage recommends how to remediate these potential weakness.

CyberSage integrates with prevailing developer workflow tools (e,g Jira) to manage the Threat Models and their remediation tasks through software releases.

How Software developers use CyberSage

  1. Interface to use: CyberSage developers portal, workflow tools (Jira)

  2. login: single-sign-on from developer workflow tools (Jira is supported in 2022).

What to do after login:

  1. pick the application and business feature under development

  2. answer a number of questions about the business profile, risk and technology related to the business feature

  3. Get Threat Model and remediation task assignment in workflow tools

Software Development Managers

CyberSage enables development managers track potential security weakness found by Threat Modeling and their remediation tasks. Through dashboard, CyberSage also support managers to make risk-based decisions on software releases.

How dev managers use CyberSage

  1. Interface to use: workflow tools (Jira), DevSecOps Dashboards

  2. Review user stories and their security weakness to make risk-based release decision

  3. Assign remediation tasks to developers

  4. Manage remediation tasks between releases

  • No labels