Threat Modeling in Modern Security Programs
I created this based on various internet sources for a company that is planning to carry out threat modelling. It is a general outline and preliminary proposal that you can adapt to your needs. Hopefully someone will find it useful.
Experts in this field may be able to provide more information, but it seems to me that this is not yet a