This phase of the blueprint will help you to assess your systems threat landscape and perform a quantified threat severity analysis, guiding you through the following activities:

  • Review the STRIDE threat model
  • Understand Info-Tech's quantitative risk model
  • Assess the system threat and risk exposure

Use this phase as part of the full blueprint, Optimize Security Mitigation Effectiveness Using STRIDE.

Also In

Optimize Security Mitigation Effectiveness Using STRIDE

Choose the right-sized security controls for your data value and risk exposure.

Related Content


Get Access

Get Instant Access
To unlock the full content, please fill out our simple form and receive instant access.
Visit our COVID-19 Resource Center and our Cost Management Center
Over 100 analysts waiting to take your call right now: 1-519-432-3550 x2019