How Teams Adopt Product Security Hub
Implementing PSH follows a proven path. Most teams move through three phases, building security knowledge and operational capability as they go.
Phase 1: Architecture & Threat Modeling
Weeks 1–2
Your team starts by mapping your product architecture in Product Security Hub. This is where you define:
- • Components & Data Flow: How data moves through your system, storage points, and trust boundaries
- • External Dependencies: Third-party libraries, services, and integrations
- • Threats: Using Product Security Hub's built-in threat catalog (mapped to CWE), identify realistic threats to your architecture
Outcome: You have a living security architecture document—not a static diagram, but a continuous reference that your team actually maintains.
Phase 2: Requirements & Vulnerability Integration
Weeks 3–4
Now you connect regulatory and risk context to your architecture:
- • Add Requirements: Import or map compliance requirements (FDA cybersecurity guidance, Health Canada, EU MDR, etc.) to your architecture
- • Import SBOMs & Vulnerabilities: Upload your SBOM and see what's vulnerable in your supply chain
- • Map Connections: See how vulnerabilities relate to your architecture threats and compliance requirements
Outcome: You now see the full picture: what threats matter, which vulnerabilities are in your code, and which compliance obligations apply—all in one place.
Phase 3: Continuous Risk Management
Ongoing
Product Security Hub becomes your operational backbone for security decisions:
- • Triage & Prioritize: Risk-assess vulnerabilities using CVSS v3/v4 context from your threat model
- • Track Decisions: Document why you accepted, mitigated, or fixed each risk
- • Report on Compliance: Generate audit-ready evidence of your security controls and risk management
- • Update as You Grow: New product version? Architecture change? Regulatory update? Product Security Hub scales with you
Outcome: Security is no longer a snapshot—it's a living, continuously-updated system that keeps pace with your product and regulatory environment.
Typical Implementation Timeline
Note: Implementation speed depends on your team size, product complexity, and existing security documentation. Most teams are operationally effective within 4 weeks.
Ready to Get Started?
See how Product Security Hub fits into your workflow and get a personalized implementation roadmap for your team.