Trial lock

This Research is for Members Only

Not a member? Unlock a free sample of our research now!

Already a member?

Sign in now

This phase of the blueprint will help you to assess your systems threat landscape and perform a quantified threat severity analysis, guiding you through the following activities:

  • Review the STRIDE threat model
  • Understand Info-Tech's quantitative risk model
  • Assess the system threat and risk exposure

Use this phase as part of the full blueprint, Optimize Security Mitigation Effectiveness Using STRIDE.

Also In

Optimize Security Mitigation Effectiveness Using STRIDE

Choose the right-sized security controls for your data value and risk exposure.

Related Content


Get Access

Get Instant Access
To unlock the full content, please fill out our simple form and receive instant access.