This phase of the blueprint will help you to catalog your existing security controls and see how they address your existing threats, guiding you through the following activities:

- Map appropriate STRIDE countermeasures to your system elements

- Report the specific controls and control maturity that are in place

Use this phase as part of the full blueprint, Optimize Security Mitigation Effectiveness Using STRIDE.

Also In

Optimize Security Mitigation Effectiveness Using STRIDE

Choose the right-sized security controls for your data value and risk exposure.

Related Content

Social

Get Access

Get Instant Access
To unlock the full content, please fill out our simple form and receive instant access.