Skip to content

Latest commit

 

History

History
32 lines (21 loc) · 787 Bytes

File metadata and controls

32 lines (21 loc) · 787 Bytes
description
This is risk centric threat Modelling Method , which means that risk plays a central role and focus is on the highest and most relevant risk which can affect business.

PASTA

cess

Attack

Simulation

Threat Analysis

Stages of PASTA

There are 7 seven stages

  1. Define the Objective
  2. Define the Technical Scope
  3. Decompose the Application
  4. Analyse the Threats
  5. Vulnerability Analysis
  6. Attack Analysis
  7. Risk and Impact Analysis