From the course: ISC2 Certified Cloud Security Professional (CCSP) Cert Prep
Unlock this course with a free trial
Join today to access over 25,300 courses taught by industry experts.
Threat modeling
From the course: ISC2 Certified Cloud Security Professional (CCSP) Cert Prep
Threat modeling
- [Instructor] Welcome to this lesson on threat modeling. In this lesson, we'll be talking about four different frameworks for threat modeling. The first one is STRIDE. The next one is DREAD, PASTA, and then finally, ATASM. Starting with STRIDE, STRIDE is a comprehensive model that was developed by the Microsoft organization, and it focuses on six key categories of threats. It's used to identify potential vulnerabilities in software systems, and each category represents a specific type of threat with corresponding mitigation strategies. Starting with spoofing, this is referring to systems and people that are pretending to be something that they're not. Next up, we have tampering, which is unauthorized altering of systems, configurations, and data. And then we have something called repudiation, which can sometimes be a confusing term, but it's talking about the ability of a person or a system to plausibly deny that they did or didn't take an action on a system. Next, we have…
Contents
-
-
-
-
-
-
(Locked)
Domain 4 overview1m 59s
-
(Locked)
Cloud development basics, common pitfalls, and vulnerabilities13m 6s
-
(Locked)
Secure software development4m 8s
-
(Locked)
Business requirements, phases, and methodologies4m 53s
-
(Locked)
Cloud specific risks10m 21s
-
(Locked)
Threat modeling7m 19s
-
(Locked)
Layered security, secure coding, and configuration4m 11s
-
Cloud software assurance and validation6m 48s
-
(Locked)
Application testing5m 13s
-
(Locked)
Securing APIs and supply chains3m 8s
-
(Locked)
Validating and managing third-party and open-source software3m 54s
-
(Locked)
Supplemental security components8m 19s
-
(Locked)
Cryptography, sandboxing, virtualization, and orchestration9m 31s
-
(Locked)
Federated identity, identity providers (IdP), and SSO6m 10s
-
(Locked)
MFA, cloud access security brokers, and secrets management5m 35s
-
(Locked)
-
-