Today we\u2019re announcing the release of the Microsoft Threat Modeling Tool 2014<\/a><\/strong>. This is the latest version of the free Security Development Lifecycle Threat Modeling Tool <\/a>that was previously released back in 2011.<\/p>\n
We have been threat modeling at Microsoft for more than 10 years. It is a key piece of the design phase of the Microsoft Security Development Lifecycle <\/a>(SDL).\u00a0 In 2011 we released the SDL Threat Modeling Tool, free of charge, to make it easier for customers and partners to threat model as part of their software development processes. The tool has been very popular and we have received a lot of positive customer feedback in addition to suggestions for improvement.<\/p>\n
We have implemented many of the suggested improvements in the new version of the tool, now called the Microsoft Threat Modeling Tool 2014<\/a>.\u00a0 Highlights of the new features in Microsoft Threat Modeling Tool 2014 include:<\/p>\n
For more details on the new features and functionality of the Microsoft Threat Modeling Tool 2014 please see the SDL blog<\/a>.<\/p>\n
You can download the tool, free of charge, here<\/a>.<\/p>\n
Tim Rains
\nDirector
\nTrustworthy Computing<\/p>\n
Today we’re announcing the release of the Microsoft Threat Modeling Tool 2014<\/a><\/strong>. This is the latest version of the free Security Development Lifecycle Threat Modeling Tool <\/a>that was previously released back in 2011.<\/p>\n
We have been threat modeling at Microsoft for more than 10 years. It is a key piece of the design phase of the Microsoft Security Development Lifecycle <\/a>(SDL). In 2011 we released the SDL Threat Modeling Tool, free of charge, to make it easier for customers and partners to threat model as part of their software development processes. The tool has been very popular and we have received a lot of positive customer feedback in addition to suggestions for improvement. Read more<\/a><\/p>\n","protected":false},"author":47,"featured_media":70228,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"ms_queue_id":[],"ep_exclude_from_search":false,"_classifai_error":"","_classifai_text_to_speech_error":"","footnotes":""},"content-type":[3663],"topic":[3687],"products":[],"threat-intelligence":[3732],"tags":[],"coauthors":[1954],"class_list":["post-26","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","content-type-research","topic-threat-intelligence","threat-intelligence-influence-operations"],"yoast_head":"\n