For years, threat modeling was treated as a separate security exercise typically conducted at the beginning of a…