Skip to content

LINDDUN Privacy Threat Modeling Process

Published on

In this module, we dive into steps of applying LINDDUN by demonstrating how to create DFD diagrams, apply threat trees to DFD elements, prioritize threats, and plan mitigations.