Are security controls themselves considered assets (e.g., cryptographic keys)

Looking at a plain system (there are no security controls implemented yet), we need to think about its functions and derive appropriate assets which we’d like to protect in order to ensure the system continues to function as intended (also… Continue reading Are security controls themselves considered assets (e.g., cryptographic keys)

What is the difference between "local" and "Adjacent" threat agents?

I am using CVSS to do the vulnerability assessment for my project.
As per documentation here is the definition of local and adjacent

Adjacent (A) The vulnerable component is bound to the network stack, but the attack is limited at the p… Continue reading What is the difference between "local" and "Adjacent" threat agents?

Threat Modeling in a Container Environment

As organizations turn to hybrid solutions, an increasing number of businesses are turning to container orchestration to provide a seamless solution to computing between environments. “Containers are units of software in which the code and all its dependencies are packed, allowing applications to run quickly and efficiently from one computing environment to another,” Container Journal explains. […]

The post Threat Modeling in a Container Environment appeared first on Security Intelligence.

Continue reading Threat Modeling in a Container Environment