PASTA Threat Modeling

Updated on
  1. Define objectives
  2. Define technical scope
  3. Decompose application
  4. Threat analysis
  5. Vulnerability analysis
  6. Attack modeling
  7. Risk and impact analysis

Further reading