Summary
Infrastructure threat modeling uses a data-flow diagram to show how data flows in the enterprise. It also shows how to protect an enterprise at each stage in the lifecycle.
In this module, you:
- Learned the importance of a well-defined, open-ended questionnaire to get a better view of the infrastructure.
- Visualized how each component interacts with the other with a detailed data-flow diagram.
- Identified infrastructure security risks using a combination of security policy gaps and the threat modeling framework.
- Reduced or eliminated risks with known security requirements and controls.