Why hasn't the industry embraced threat modeling development inspite of many frameworks available? While DevOps (and DevSecOps) has gained traction? Even within companies that claim to practice DevSecOps, threat modeling is often ignored.
What is HN's opinion on this?
This CMU post lists 12 different Threat Modeling approaches:
https://insights.sei.cmu.edu/blog/threat-modeling-12-available-methods/
Threat modeling can help indirectly with both getting code to production securely, and satisfying auditors, but it's neither necessary nor sufficient for either, so rarely makes sense for a company to practice themselves.
Instead there may be an aspect of threat modeling carried out by a third party pentester, but mostly what that will do is raise the direct cost of the pentest and maybe lead to more expensive remediation costs as well.
One can look at fuzzing- architectural as well as endpoint- as an actual automatable, codeable DevSecOpsy activity that is kind of distilled, operationalized threat modeling. Eg automatically build a fuzz plan from Terraform as well as as from OpenAPI schemas. It needs a clever name.