• Home
  • BVSSH
  • Engineering Enablement
  • Playbooks
  • Frameworks
  • Good Reads
Search

What are you looking for?

Standard : Teams understand the threat models relevant to their domain

Purpose and Strategic Importance

This standard ensures teams understand the threat models relevant to their domain-so they can design systems that mitigate real-world risks, not just theoretical ones. It strengthens proactive security thinking at every layer of development.

Aligned to our "Secure by Design" policy, this standard builds risk awareness and reduces vulnerabilities before they reach production. Without it, teams may unknowingly expose systems to avoidable threats and compromise trust.

Strategic Impact

  • Improved consistency and quality across teams
  • Reduced operational friction and delivery risks
  • Stronger ownership and autonomy in technical decision-making
  • More inclusive and sustainable engineering culture

Risks of Not Having This Standard

  • Slower time-to-value and increased rework
  • Accumulation of inconsistency and process debt
  • Reduced trust in engineering data, systems, or ownership
  • Loss of agility in the face of change or failure

CMMI Maturity Model

  • Level 1 – Initial: Threat modelling is informal or non-existent. Security risks are reactive, identified only after incidents or audits.

  • Level 2 – Managed: Some teams conduct threat modelling during development, but it's ad hoc and not consistently applied across systems or phases of delivery.

  • Level 3 – Defined: Threat modelling is a documented and repeatable practice. Teams are trained on relevant threats in their domain and apply structured techniques (e.g., STRIDE, DREAD) during design.

  • Level 4 – Quantitatively Managed: Threat models are reviewed regularly and aligned to architectural artefacts. Coverage is tracked, and data informs mitigation planning and security posture improvement.

  • Level 5 – Optimising: Threat modelling is continuously improved through feedback loops, retrospectives, and incident learnings. Security considerations are embedded early, reducing vulnerabilities and raising trust across the engineering lifecycle.


Key Measures

  • Adoption rates and coverage across teams
  • Impact on delivery metrics, quality, or team health
  • Evidence of ownership, governance, or learning loops
Associated Policies
  • Secure by Design
Associated Practices
  • Infrastructure Threat Detection
  • Zero Trust Architecture
  • Identity Federation
  • Just-in-Time Access
  • Secret Rotation Automation
  • Software Composition Analysis (SCA)
  • Dynamic Application Security Testing (DAST)
  • Multi-Factor Authentication (MFA)
  • Secrets Management in Pipelines
  • Static Application Security Testing (SAST)

Technical debt is like junk food - easy now, painful later.

Awesome Blogs
  • LinkedIn Engineering
  • Github Engineering
  • Uber Engineering
  • Code as Craft
  • Medium.engineering