In the software security development life cyle process, threat modeling occurs in which phase?
Design
Requirements
Verification
Implementation
Submit