STRIDE Threat Modeling for Beginners - In 20 Minutes

Поділитися
Вставка

КОМЕНТАРІ • 36

  • @hojatsajadinia8905
    @hojatsajadinia8905 9 місяців тому +6

    Really good for starting thread modeling.

  • @borroms97
    @borroms97 Рік тому +1

    Thanks for sharing your knowledge on this, I am studying for CISSP and your video has helped me understand how a Threat Modelling exercise is actually done.

  • @adansko
    @adansko 9 місяців тому +2

    A great introduction to beginners. I learned a lot. Thank you!

  • @sharna.rahman
    @sharna.rahman Місяць тому

    I will conduct my first Threat Modeling session with a developer team soon and your video is super helpful to understand all the details. Very simple and informative. Keep up the good work!

    • @NetsecExplained
      @NetsecExplained  Місяць тому

      Glad to hear it! That's why I made this. When I first started out with threat modeling, I was in the same situation and noticed how few people actually show their process and instead focus on "tools" that felt ultimately unhelpful. Hope your session goes well.

  • @PaigeHokanson-z2g
    @PaigeHokanson-z2g 2 місяці тому

    • @NetsecExplained
      @NetsecExplained  2 місяці тому

      It's been a game changer when working with developers and explaining threat modeling to them.

  • @jerryb1705
    @jerryb1705 8 місяців тому

    Thanks. The video helped me understand the threat modelling concept better.

  • @Digi-qb1
    @Digi-qb1 3 місяці тому

    The information you get from this video is a solid introduction. Great job!!! Thank you.

  • @DebasishMandal
    @DebasishMandal 2 місяці тому

    This is the most useful video on threat modeling on the internet! thank you for making it!

  • @Stew282
    @Stew282 9 місяців тому +2

    Great explanation and example. Thanks!

  • @papoy9084
    @papoy9084 8 місяців тому +1

    @11:42 minutes, you mentioned PASTA, can you please make a video about PASTA vs STRIDE and other threat modelling approaches?

    • @NetsecExplained
      @NetsecExplained  7 місяців тому +1

      I don't want to make a whole video on PASTA since I haven't used it enough. PASTA is more geared towards internal teams and has you work with your dev/systems steams more closely. It needs to be more ingrained in the planning process. But it is great!

  • @eilonc
    @eilonc 11 місяців тому

    Thanks! awesome demonstration on how to perform Threat Modeling.

  • @funkzsnoopy
    @funkzsnoopy 2 місяці тому

    Very nice explanation! Thank you!

  • @nojozol1816
    @nojozol1816 6 місяців тому

    this awesome. hoping you make one more complex as well !

  • @monsieurdelaperouse9756
    @monsieurdelaperouse9756 2 місяці тому

    Excellent! Thank you very much!

  • @DontFookGaming
    @DontFookGaming 9 місяців тому +1

    Nicely explanation, I have one question, why you are doing this in manually, there is a tool from Microsoft. That tool will do all things automatically for you. Any specific reason you do this manually?

    • @NetsecExplained
      @NetsecExplained  7 місяців тому +4

      This is actually a really great question. Sometimes you can over automate things. I don't like the MS tool because unless you're seasoned and have the tool configured properly, it's overwhelming and ultimately unhelpful. You need to spend so much more time getting the tool set properly to make your threat models useful. I don't recommend it unless you already know what you're doing.

  • @ashleywicks2762
    @ashleywicks2762 Місяць тому

    Thanks heaps for this video super helpful.

  • @TejasJain1991
    @TejasJain1991 11 місяців тому

    Would you define trust boundries around every single "node" if you are to follow the Zero Trust framework?

    • @NetsecExplained
      @NetsecExplained  11 місяців тому

      That's a good question! I actually don't know the answer to that. I think I would start by segmenting off the environment like normal, then make sure to include mutual authentication and allow list authorization into my trust requirements. If any component didn't enforce those two things in every part of each segment, then I'd flag that as a new vulnerability to be remediated.
      This is why I like standard security patterns that you can enforce internally. That way, there is no guessing. "Doesn't authenticate through our standard process? Vulnerability, remediate it immediately."

  • @HarishKumar-lz2nw
    @HarishKumar-lz2nw 2 місяці тому

    Very informative. Thanks

  • @christopherortiz4971
    @christopherortiz4971 5 місяців тому

    Thank you, really easy to understand

  • @ishwaryanarayan1010
    @ishwaryanarayan1010 5 місяців тому

    Very informative 🙏

  • @LasseStorgaard
    @LasseStorgaard 11 місяців тому

    Really good video, thank you!

  • @NuruddinBiplob
    @NuruddinBiplob 8 місяців тому

    Thanks a lot.

  • @MikeAdams
    @MikeAdams 11 місяців тому

    Maybe I'm just blind but I don't see the completed threat model report in the description? :(

    • @NetsecExplained
      @NetsecExplained  11 місяців тому

      That's a good point. It's there, but not labeled as the completed threat model. It's the aivillage link. I will update the description.

  • @smarthometechnologee
    @smarthometechnologee Місяць тому

    I need some help can you please advise how can i reach you.

    • @NetsecExplained
      @NetsecExplained  Місяць тому

      We can message on here. What can I help you with?

  • @michaelschwartz8922
    @michaelschwartz8922 9 днів тому

    Awesome!!