

You threat-model all the time as you consider how these different events could damage your person. You heard a dog barking from the direction where you needed to walk. You heard cars rushing by on the street, exceeding the speed limit.

You closed the door behind you and you began to threat-model the area around you. What if I told you that you already know how to threat model, and that you threat-model every day? Think about when you left the house this morning.

When threat modeling is firing on all cylinders, an organization is creating more secure software. Threat modeling, the process of discovering potential security vulnerabilities in a design and eliminating those vulnerabilities before writing any code, fits best during the stage of planning and designing a new feature. Not that I sit around and dream of threat modeling all day, but I dream of embedding a process of security threat modeling within an entire development organization. Threat modeling has always been a dream of mine.
