Threat ModellingSTRIDE by Microsoft security researchersPASTA Â Incident Response CSIRTTo successfully solve an incident, these steps are often referred to as the six phases of Incident Response that takes place, listed in the table below: