
You are conducting threat modeling based on the Microsoft approach. Which of the following stages will you apply the categorized threat list, STRIDE? (Wentz QOTD)
A. Identify threats
B. Document & validate
C. Diagram application architecture
D. Identify, prioritize & implement controls
Kindly be reminded that the suggested answer is for your reference only. It doesn’t matter whether you have the right or wrong answer. What really matters is your reasoning process and justifications.