In the software security development life cycle process, threat modeling occurs in which phase?
Design
Requirements
Verification
Implementation
Submit