I read about application threat modeling which makes a software products secure from its initial stages (SDLC). But if we do something wrong in the deployment phase still that will be an issue.
For example, a sysadmin opens a port in the firewall that isn't required by the product.
So is there a methodology that we can use to identify deployment time threats?