target audience: TECH BUYER  Publication date: Feb 2024 - Document type: IDC Perspective - Doc  Document number: # US51841324

How Threat Modeling Enables Security by Design

By:  Nick Kirtley Loading

Content



Get More

When you purchase this document, the purchase price can be applied to the cost of an annual subscription, giving you access to more research for your investment.



Related Links

Abstract


This IDC Perspective looks at the benefits of adopting threat modeling within into the application development life cycle and as an instrument within DevOps. Threat modeling can help identify threats (flaws) and countermeasures (security requirements). Security requirements help teams build security features to mitigate the identified threats.

“With threat modeling, teams can build security features based on specific and documented security requirements during the design phase, before the application is deployed, right through to later phases in the DevOps development life cycle,” says Nick Kirtley, adjunct research advisor for IDC’s IT Executive Programs (IEP). “This provides measurable steps in developing the security of an application, which adds trust for customers, regulators, and other important stakeholders.”



Coverage


Do you have questions about this document
or available subscriptions?