In Chapter 2, Vulnerabilities, Attacks, and Countermeasures, we walked through a threat modeling process for a smart parking system. Here, we talk more about the threat modeling process and discuss a tool that can be used to model the threats to your unique systems.
The best defense against attacks aimed at your products and systems is to design security in from the beginning. But not all systems are alike, and nor do they each face the same threats. Design teams must arm themselves with the information needed to understand the unique threats faced by their systems. This requires starting out with a threat model of your system.
The outputs of your threat model will allow you to derive security requirements/user stories that ...