There are three important steps to follow:
- Take the threat models per feature, per layer and confirm that there is no blind spots or variations on the expectation
- Check the code path to improve the understanding of the code path and what is happening in the threat model
- Confirm that there are no extra behaviours
(from SecDevOps Risk Workflow book, please provide feedback as an GitHub issue)