ISM-1238

Threat modelling is used in support of application development.

Topic
Secure software design and development
Applicable to
all

History

Priority
should
Mar 2022
Threat modelling is used in support of application development.
Miscellaneous changes were made to rationale and recommendations throughout the publication to clarify content without changing intent. This included a review from the Guidelines for System Hardening chapter through to the Guidelines for Data Transfers chapter.
2017
Threat modelling and other secure design techniques should be used to ensure that threats tosoftware and mitigations to these threats are identified.
Control Text Changed. No public explaination.
2015
Agencies should use threat modelling and other secure design techniques to ensure thatthreats to software and mitigations to these threats are identified.