top of page

Technical Research Paper

RP-907-cover pic.png

Cybersecurity Risk by Design (CRD): Integrating DRM and DTM for Enhanced Threat Modeling

Citations (7) - References (4)  Figures (3)

Publication Date:

​​July 10, 2025

​

​Author / Task Group:​

​​ISAU-TG57-2025

​

​Document Registration  Number:

​​​ISAU-RP-907-2025-CRD

Abstract

The Cybersecurity Risk by Design (CRD) model represents a transformative enhancement to threat modeling practices within cybersecurity engineering. Integrating structured methodologies from traditional engineering disciplines—specifically, the Design Risk Model (DRM) and the Design Threat Model (DTM) —CRD addresses fundamental shortcomings that have historically limited the effectiveness of threat modeling. Current cybersecurity breaches highlight persistent gaps, which are exacerbated by the rapidly evolving complexities of advancements such as artificial intelligence (AI) and cloud infrastructures. Drawing upon cross-disciplinary expertise from civil, aerospace, and systems engineering, the CRD model proactively identifies, analyzes, and mitigates threats systematically from the earliest stages of design. Aligned closely with the mandatory threat modeling guidelines advocated by the National Institute of Standards and Technology (NIST), this approach provides cybersecurity engineers with a structured, defensible framework to dramatically enhance the accuracy and efficacy of threat modeling processes. Empirical evidence underscores substantial benefits, including significantly reduced vulnerabilities, improved cost efficiency, and strengthened operational resilience. Further augmented by intelligent engineering, which continuously integrates real-time threat intelligence and advanced analytics, the CRD model equips organizations with predictive capabilities and adaptive resilience, critical for securely managing contemporary, complex technological environments.

 

Key words: Cybersecurity Risk by Design (CRD), Design Risk Model (DRM), Design Threat Model (DTM), Intelligent Engineering, Threat Modeling (TM), Cybersecurity Engineering, Proactive Risk Mitigation, Artificial Intelligence (AI), Cloud Security, Operational Resilience, Cross-Disciplinary Engineering.

How to Stay Informed

​

  • Subscribe to Updates – Join our newsletter for new report announcements.

  • Access via Library – Browse and download reports through the Technical Whitepaper Library.

  • Suggest a Report Topic – Members may propose high-priority topics for future analysis.

 

For more information, contact the ISAUnited Research Center team below.

Contact Us

Guest

For any questions or concerns, fill out our form or email us at:

research@isaunited.org

Thanks for Submitting!

Members

For any requests or suggestions, click here to generate a support ticket:

ISAUnited-01_white_edited.png

Institute Support Hours

HIn

Monday:          8-5 p.m. CST

Tuesday:         8-5 p.m. CST

Wednesday:  8-5 p.m. CST

Thursday:       8-5 p.m. CST

Friday:             8-5 p.m. CST

Saturday:       CLOSED

Sunsday:        CLOSED

Social Media: 

  • LinkedIn
  • X
  • Instagram
  • Facebook

Headquarters: United States. Houston, Texas.

All Rights Reserved • Property Of ISAUnited.org

© 2019-2026 Institute of Security Architecture United

bottom of page