This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit

Talk:Application Threat Modeling

Jump to: navigation, search

I'd like to propose that this page be dramatically simplified, and should present a framework (possibly the 4 question one), with related pages covering things like alternate diagram types and risk management -- Adam Shostack