3

Reviewing Different Threat Models

Threat modeling is a key component within any security operation center (SOC) and security environment as a whole, and just as with any SOC environment, there is no one size fits all for threat models.

This chapter will cover multiple threat models, their use cases, and their advantages and disadvantages. Doing so will allow the reader to apply the one that makes the most sense for their environment as well as provide a comparison point for comparing those threat models to ATT&CK:

  • Reviewing the PASTA threat model and use cases
  • Reviewing the STRIDE threat model and use cases
  • Reviewing the VAST threat model and use cases
  • Reviewing the Trike threat model and use cases
  • Reviewing attack trees

Technical requirements ...

Get Aligning Security Operations with the MITRE ATT&CK Framework now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.