cancel
Showing results for 
Show  only  | Search instead for 
Did you mean: 
cancel
Showing results for 
Show  only  | Search instead for 
Did you mean: 
AurelieE
Newcomer I

Question about threat modeling process

Hi, I'm currently training for the CSSLP examen.

 

And in the course, for the threat modeling part, to generate a Data Access Control Matrix

 

It's speak about identify the technologies that will be used in building the application and identify external dependencies. But I don't know how to add those information in the result matrix as it's for the Data Access.

That will be determine as user ?

 

Thanks for the reply

1 Reply
Caute_cautim
Community Champion

@AurelieE    I found this example from Microsoft, which may be useful, as it contains useful illustrations and an example.

 

https://download.microsoft.com/download/0/F/0/0F0CA79D-6A56-4B8B-AB07-8359DCB18335/Effective_Threat_...

 

Others may have other illustrative examples for you.

 

Hope it helps?

 

Regards

 

Caute_Cautim