Automated
A security consultant using a threat modeling tool such as https://devops.security describes the application and the threat modeling is automatically generated.
The process is reproducible and requires less specific knowledge from the consultant but more quality of the tool.
Resources
- devops.security by Kakugo GmbH