Creator
Description
The CyWG develops a threat profile, incorporating known cybersecurity adversary objectives, resources, and Tactics, Techniques, and Procedures (TTPs) and evaluates the threat likelihood in terms of difficulty of attacks. This helps prioritize the attack surface list, to document the desired threat representation for testing, determinign, and prioritizing the adverary's desired mission-based effects. The threat profile includes:Owning Diagram A22: Analyze the Attack Surface