**4.5 Overall advantages and limitations of threat modeling**

Six main beneficial aspects can be explained as on how threat modeling can help the security team to significantly enhance safety of the organization's technology assets. These benefits can be explained as the following points:


Although threat modeling helps in many aspects in stopping and mitigating the risks of security breaches and attacks, still there are considerable challenges to be highlighted for the wide practical deployment and adoption of threat modeling. These challenges can be identified in five main aspects as the following:

**Challenge 1: Processes saturation related to Threat Modeling**

*Intelligent Cybersecurity Threat Management in Modern Information Technologies Systems DOI: http://dx.doi.org/10.5772/intechopen.105478*

This challenge is due to numerous availability of threat modeling methodologies that may create confusion especially for teams lacking highly security expertise. This may lead to wrong choices for defense policies or cybersecurity investments.

#### **Challenge 2: Scaled-up Modern Application Deployment**

The recent departure of IT applications from physical servers and networking infrastructure to cloud computing infrastructure added new complexities related to responsibilities, expanded technologies, scope changes and associated risks which are no usually easy to be handled by the development teams.

#### **Challenge 3: More systems entries points that are still not well recognized**

The most obvious examples here are modern cloud services provider like AWS where many entry points are not yet recognized and these may include publiclyexposed management plane, APIs and services. These are significantly more complex in comparison with known entry points especially for the Data Flow Diagram (DFDs) and Processes Flow Diagram (PFDs).
