Skip to content

Threat models must be documented and reviewed for each application release and updated as required by design and functionality changes or when new threats are discovered.

An XCCDF Rule