CyberSage, Threat Modeling Automation

Skip to end of metadata
Go to start of metadata

You are viewing an old version of this page. View the current version.

Compare with Current View Page History

« Previous Version 4 Current »

Step 1: Choose the software application and the business feature to perform the threat modeling.

Step 2: answer the questions asked by the engine to proceed

optional: click to get help from security knowledge base to further understand the weakness identified and how to remediate

sample security knowledge base article

Step 3: At the end of the threat modeling, you can either save the result (the threat model) to Jira or visualize the attack tree generated by the engine

Sample attack tree

sample Jira issue link (after you click “Save to Jira”)

  • No labels