SD Blueprint
Automate threat model generation, management of security requirements, and adherence to regulatory compliance.
SD Blueprint
SD Blueprint

What is SD Blueprint?

SD Blueprint accelerates your team’s ability to identify security and regulatory compliance requirements, regardless of their level of product security expertise.

Simplified Onboarding Workflow

SD Blueprint
SD Blueprint provides a seamless onboarding experience through in-product guidance.
SD Blueprint
SD Blueprint

Multiple Input Sources

SD Blueprint
SD Blueprint swiftly identifies security and compliance requirements through importing existing threat model diagrams, creating new diagrams within SD Blueprint, or completing a survey.

Risk Prioritization

SD Blueprint
SD Blueprint prioritizes threats, weaknesses, and the corresponding countermeasures based on risk. These requirements are aligned with the different phases of the development lifecycle and cover relevant regulations.
SD Blueprint
SD Blueprint

Expansive Security Content Library

SD Blueprint
SD Blueprint’s content library encompasses regulatory compliance, privacy standards, industry standards, secure coding frameworks, and cloud security.

Compliance Reports

SD Blueprint
With SD Blueprint, you can generate compliance reports based on our list of distinct regulations and standards.
SD Blueprint
CAPABILITY 1:

Simplified Onboarding workflow

SD Blueprint offers in-product guidance, empowering users to confidently identify security and compliance requirements independently.
SD Blueprint
CAPABILITY 2:

Multiple Input Sources

Whether you import existing threat model diagrams, create them from scratch, or complete the SD Blueprint survey, SD Blueprint will intelligently identify and rank security and compliance requirements based on risk.

SD Blueprint
CAPABILITY 3:

Risk Prioritization

SD Blueprint prioritizes threats, weaknesses, and the corresponding countermeasures. These requirements are aligned with different phases of the development lifecycle and cover relevant regulations.
SD Blueprint
CAPABILITY 4:

Expansive Security Content Library

SD Blueprint’s content library of threats, weaknesses, and countermeasures covers 70+ regulations and standards.
SD Blueprint
CAPABILITY 5:

Compliance Reports

With SD Blueprint, you can generate compliance reports from our list of distinct regulations and standards.
SD Blueprint

Compliance Regulations in SD Blueprint

Developer-Centric Security

Effortless Integration, Frictionless Processes, Optimal Results

SD Blueprint

Developer Empowerment

Are your developers empowered to independently create thorough threat models? The journey begins with the right resources and training.
Are your developers empowered to independently create thorough threat models? The journey begins with the right resources and training.
SD Blueprint

Efficiency in Compliance

Time is of the essence when identifying security and compliance requirements. Discover the pathway to efficiency without hurdles.
Time is of the essence when identifying security and compliance requirements. Discover the pathway to efficiency without hurdles.
SD Blueprint

Frictionless Integration

How do we integrate security seamlessly without disrupting developer workflows, avoiding
added friction?
How do we integrate security seamlessly without disrupting developer workflows, avoiding added friction?
SD Blueprint

Prioritizing Developer Experience

Balancing enhanced security with team harmony: how do we ensure decisions always prioritize the developer experience?
Balancing enhanced security with team harmony: how do we ensure decisions always prioritize the developer experience?

Select the product that’s right for you

SD Blueprint

Getting Started

5 projects

Starting from

$20K* annually

SD Blueprint

Leveling Up

15 projects

Starting from

$45K* annually

SD Blueprint

Getting Started

5 projects

Starting from

$20K* annually

SD Blueprint

Leveling Up

15 projects

Starting from

$45K* annually

* Pricing is in USD and only valid for new Security Compass customers headquartered within North America. For companies outside of North America please contact us.

SD Blueprint

Getting Started

Starting from

$20K

annually

5 projects

*unlimited releases per project

Diagram tools
Security content
Compliance
Code samples for developers
Dashboards and project reports
Base support only

Recommended

SD Blueprint

Leveling Up

Starting from

$45K

annually

15 projects

*unlimited releases per project

Diagram tools
Security content
Compliance
Code samples for developers
Dashboards and project reports
Standard and premium support

SD Blueprint

Enterprise

Starting from

$75K

annually

15 projects

*unlimited releases per project

Diagram tools
Security content
Compliance
Code samples for developers
Dashboards and project reports
Advanced reporting
Customize unique requirements
DevSecOps tools integrations
Standard and Premium support

US Fed and Government

Call for details

Call for details

Diagram tools
Security content
Compliance
Code samples for developers
Dashboards and project reports
Advanced reporting
Customize unique requirements
DevSecOps tools integrations
Just-in-Time Training
Onsite deployment

What problems does SD Blueprint solve?

All threats are contextualized to the diagram you import or build within SD Blueprint. These threats will be broken down at the component level and across the different phases in the development lifecycle. The threats will also be organized into the STRIDE categories: Spoofing, Tampering, Repudiation, Information Disclosure, Denial of Service, and Elevation of Privilege.
The repository scan feature allows automatic scanning of your GitHub and GitLab repositories to create a threat model diagram or build a survey. Solutions and secure code suggestions can be added directly into your integrated development environment (IDE).
SD Blueprint offers reports for each of your projects. These reports include:
  • Compliance Reports: This report outlines the completion status of countermeasures that apply to a particular compliance regulation (HIPAA, PCI DSS, etc).
  • Project Risk Policy Reports: This report provides a list of the countermeasures that need to be addressed in your project in order to be compliant with their assigned risk policies.
  • Completion Status Reports: This report summarizes the completion status of security countermeasures in specific phases of your project.
  • Weakness Summary Reports: This report outlines the weaknesses (security risks) in your project that have been identified by SD Blueprint.
  • Countermeasure Reports: This report summarizes all the countermeasures relevant to your project.
Once your requirements have been identified, you will have the ability to assign them to specific users to address. This includes leaving notes and assigning specific users to complete specific countermeasure(s).
Security Compass ensures the quality of our security content by having it maintained and continually updated by our dedicated security research team.
  • Each countermeasure provides a solution to address the requisite weakness. Certain countermeasures will also provide “How-Tos” that will include secure code samples that can be added to your IDE.
  • SD Blueprint will also have in-app guides to support first time users.
Once your requirements have been identified, each countermeasure will highlight the specific sections of each regulation that it addresses. To assess overall compliance progress, such as PCI-DSS v4.0, you can select that regulation within the Project Reports → Compliance Reports section.

Additional resources

Interested in benefits of automating your processes?

By automating key portions of your proactive manual security processes, you can speed up software releases and improve product security — all at the same time.