Summary
Threat modeling an application before adding it to a secured environment helps you identify and secure potential risks as early as possible.
In this module, you:
- Understood the importance of a well defined, open-ended questionnaire to get a better view of the application.
- Visualized how the application interacts with the secured environment with a detailed data-flow diagram.
- Identified security gaps using the threat modeling framework.
- Reduced or eliminated risks with known security requirements and controls.
Further reading:
- Learn more about privileged access workstations.
- Check out how Microsoft protects high-risk environments with privileged access workstations.
- See how an engineering group reduces risk with privileged access workstations.