diff --git a/cheatsheets/Threat_Modeling_Cheat_Sheet.md b/cheatsheets/Threat_Modeling_Cheat_Sheet.md index 33901e177e..b598d17497 100644 --- a/cheatsheets/Threat_Modeling_Cheat_Sheet.md +++ b/cheatsheets/Threat_Modeling_Cheat_Sheet.md @@ -133,12 +133,14 @@ An alphabetical list of techniques: - [OWASP's Threat Dragon](https://github.com/OWASP/threat-dragon) - [OWASP's pytm](https://owasp.org/www-project-pytm/) - [TaaC-AI](https://github.com/yevh/TaaC-AI) - AI-driven Threat modeling-as-a-Code (TaaC) +- Threat Composer - [Demo](https://awslabs.github.io/threat-composer), [Repository](https://github.com/awslabs/threat-composer/) ### General Reference - [Awesome Threat Modeling](https://github.com/hysnsec/awesome-threat-modelling) - resource list - [Tactical Threat Modeling](https://safecode.org/wp-content/uploads/2017/05/SAFECode_TM_Whitepaper.pdf) - [Threat Modeling: A Summary of Available Methods](https://insights.sei.cmu.edu/library/threat-modeling-a-summary-of-available-methods/) +- Threat modeling for builders, free online training available on [AWS SkillBuilder](https://explore.skillbuilder.aws/learn/course/external/view/elearning/13274/threat-modeling-for-builders-workshop), and [AWS Workshop Studio](https://catalog.workshops.aws/threatmodel/en-US) - [Threat Modeling Handbook](https://security.cms.gov/policy-guidance/threat-modeling-handbook) - [Threat Modeling Process](https://owasp.org/www-community/Threat_Modeling_Process) - [The Ultimate Beginner's Guide to Threat Modeling](https://shostack.org/resources/threat-modeling)