threat modeling

last edited Fri, 20 Sep 2024 07:20:06 GMT
backlinks: null


A method where security attributes of an existing system are identified to understand security threats and potential mitigation. The overall process involves organizing and analyizing critical details involving the system's infrastructure. The process can be repeated as the system evolves and changes over time. [1]

Threat modeling consists of asking ourselves 4 key questions; What are we working on? What can go wrong? What are we going to do about it? And, did we do a good enough job? [2]

Threat Modeling in 5 Steps [3] Identify assets, threats, and vulnerabilities prior to building the threat model. Databases, software, ann hardware can all be assets. Perform the following steps for each asset.

  1. identify your security objectives
  2. create an application overview detailing users, input/output
  3. decompose the application and underlying behavior using a data flow diagram (DFD)
  4. identify threats from data collected in step 2 and 3
  5. identify vulnerabilties

Methodology direct link to this section

DREAD direct link to this section

Classification that results in a numerical value used to measure amount of risk with each threat. Result is a value 0-10.

Risk Score = (DAMAGE + REPRODUCIBILITY + EXPLOITABILITY + AFFECTED USERS + DISCOVERABILITY)

STRIDE direct link to this section

Used by Microsoft's threat modeling tool and by OWASP's Threat Dragon.

Threat Category Violation
spoofing authenticity
tampering integrity
repudiation non-repudiability
information disclosure confidentiality
denial of service availability
elevation of privileges authorization

LINDDUN direct link to this section

Based on STRIDE.

  1. model the system, typically using DFDs
  2. elicit threats by going over each of thee DFD elements. Each identified threat should be documented.
  3. manage threats and prioritize according to risk, then apply suitble mitigation strategies

OCTAVE direct link to this section

Operationally Critical Threat, Asset, and Vulnerability Evaluation methodology, focuses on organizational risk.[4] The methodology is qwll documented to an overwhelming degree.

PASTA direct link to this section

Process for Attack Simulation and Threat Analysis

  1. Define Business Objectives
  2. Define Tech Scope
  3. App Decomposition
  4. Threat Analysis
  5. Vulnerability Detection
  6. Attack Enumeration
  7. Risk/Impact Analysis

Real World Examples direct link to this section


  1. OWASP ↩︎

  2. Threat Modeling Manifesto ↩︎

  3. Infosec Institute ↩︎

  4. OCTAVE Implementation Guide ↩︎

  5. Secure Drop ↩︎

  6. A Formal Security Analysis of the Signal Messaging Protocol ↩︎

  7. Docker Threat Model ↩︎