Episode 27 — Prioritize Application Risks Using Threat Modeling and Abuse-Case Thinking

This episode explains threat modeling and abuse-case thinking as methods to prioritize application risk, a concept the exam often evaluates through risk-based decision making and practical governance. You will learn how to identify assets, entry points, trust boundaries, and data flows, then describe attacker goals in abuse cases that make risks concrete and comparable. We show how to rank risks using impact, likelihood, and exploitability, and how to convert the top items into actionable engineering tasks with owners and validation steps, rather than producing a document that is never revisited. Examples include modeling a new API feature that introduces sensitive data exposure, identifying where authorization can fail, and selecting mitigations such as stronger identity checks, safer defaults, and improved monitoring. Troubleshooting guidance covers common issues like overcomplicating models, ignoring change-driven updates, and missing dependency and supply chain risks that bypass traditional input validation assumptions. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.
Episode 27 — Prioritize Application Risks Using Threat Modeling and Abuse-Case Thinking
Broadcast by