- Inform security control selection based on identified attack vectors
- Guide security testing priorities and coverage requirements
- Provide shared understanding between security and engineering teams
- Document risk decisions and mitigation strategies
- Enable compliance with frameworks like NIST Cybersecurity Framework and ISO 27001
Threat Modeling Methodologies Overview
The following table compares major threat modeling methodologies to help select the appropriate approach for different contexts:| Methodology | Focus | Best For | Time Investment | Key Output |
|---|---|---|---|---|
| STRIDE | Threat categories | Technical teams, systematic enumeration | Medium | Threat matrix by component |
| PASTA | Attack simulation | High-risk features, business alignment | High | Risk-prioritized attack scenarios |
| TRIKE | Asset risk levels | Data-sensitive systems | Medium | Acceptable risk thresholds |
| OCTAVE | Organizational risk | Enterprise risk management | High | Organization-wide risk assessment |
| Attack Trees | Goal decomposition | Attack path analysis | Variable | Visual attack hierarchies |
STRIDE
STRIDE categorizes threats into six types, each mapping to security properties and corresponding mitigations:| Threat | Security Property | Example Mitigations |
|---|---|---|
| Spoofing identity | Authentication | MFA, strong authentication, certificate validation |
| Tampering with data | Integrity | Digital signatures, checksums, access controls |
| Repudiation of actions | Non-repudiation | Audit logging, digital signatures, timestamps |
| Information disclosure | Confidentiality | Encryption, access controls, data masking |
| Denial of service | Availability | Rate limiting, redundancy, resource quotas |
| Elevation of privilege | Authorization | Least privilege, input validation, sandboxing |
- Works well for technical teams familiar with security concepts
- Provides comprehensive threat coverage through systematic enumeration
- Can become mechanical box-checking without considering actual adversary capabilities
- Pairs effectively with Microsoft Threat Modeling Tool
PASTA
Process for Attack Simulation and Threat Analysis (PASTA) provides a seven-stage, attack-centric methodology with business impact alignment:- Define objectives — Establish business and security objectives
- Define technical scope — Document application architecture and dependencies
- Application decomposition — Create data flow diagrams and identify entry points
- Threat analysis — Research threat intelligence and attack patterns
- Vulnerability analysis — Identify weaknesses using CVE databases and CWE
- Attack modeling — Build attack trees and simulate attack scenarios
- Risk/impact analysis — Quantify business impact and prioritize mitigations
TRIKE
TRIKE provides risk-based threat modeling with asset-centered authorization models:- Focuses on acceptable risk levels for different assets
- Drives threat enumeration by asset value and acceptable risk thresholds
- Aligns well with data classification and protection requirements
- Suitable for systems handling sensitive data with clear classification schemes
OCTAVE
Operationally Critical Threat, Asset, and Vulnerability Evaluation (OCTAVE), developed by Carnegie Mellon’s SEI, provides organization-centric threat modeling:- Focuses on organizational risk rather than technical vulnerabilities
- Suitable for enterprise risk management and compliance requirements
- Involves business stakeholders in threat identification
- Builds shared understanding of security risks and organizational impact
Attack Trees
Attack trees decompose adversary goals into subgoals and attack steps, creating hierarchical representations of attack paths:- Root node — Represents the attacker’s ultimate goal (e.g., “Exfiltrate customer data”)
- Intermediate nodes — Represent subgoals achieved through child nodes
- Leaf nodes — Represent atomic attack steps that can be directly assessed
- AND/OR logic — Defines whether all children or any child achieves the parent goal
- Prioritize defenses by identifying critical nodes whose mitigation blocks multiple paths
- Enable cut set analysis to identify minimum mitigations blocking all attack paths
- Provide visual representation for stakeholder communication
- Support quantitative risk analysis through probability and cost assignment
Data Flow Diagrams
Data Flow Diagrams (DFDs) model system components and provide the foundation for most threat modeling methodologies:| DFD Element | Symbol | Description | Threat Consideration |
|---|---|---|---|
| External Entity | Rectangle | Users, systems, or services outside the system boundary | Authentication, input validation |
| Process | Circle | Functions that transform or process data | All STRIDE categories |
| Data Store | Parallel lines | Databases, files, caches | Tampering, disclosure, DoS |
| Data Flow | Arrow | Movement of data between components | Interception, modification |
| Trust Boundary | Dashed line | Security boundary between zones | Critical control points |
Embedding Threat Modeling in SDLC
Integrating threat modeling into the software development lifecycle ensures security analysis occurs at design time rather than after implementation.Triggering Events
Threat modeling should be triggered by architectural changes rather than calendar schedules:| Trigger Event | Priority | Rationale |
|---|---|---|
| New services or API endpoints | High | Introduces new attack surface |
| Data classification changes | High | Sensitive data requires additional controls |
| Third-party integrations | High | External dependencies introduce trust relationships |
| Authentication/authorization changes | Critical | Identity controls are high-value targets |
| Infrastructure changes | Medium | Network architecture affects threat landscape |
| Significant refactoring | Medium | May invalidate existing threat model assumptions |
- Pull request templates with security review checkboxes
- Architecture Decision Record (ADR) processes requiring threat assessment
- Design review checklists with threat modeling requirements
- OWASP Threat Dragon integration for diagram-based modeling
Threat Modeling Artifacts
Effective threat modeling produces artifacts that inform development and testing:- Context diagrams — System boundaries and external entities
- Data flow diagrams — Trust boundaries and data movement
- Threat register — Identified threats with likelihood and impact ratings
- Mitigation matrix — Proposed controls mapped to threats
- Residual risk documentation — Accepted risks with justification
- Security test requirements — Test cases derived from threat scenarios
Ownership and Review
Establish clear ownership models for threat modeling scalability:- Product teams author threat models with domain knowledge
- Security teams provide training, templates, and review guidance
- Architecture review boards validate alignment with security standards
- Risk committees approve risk acceptances above defined thresholds
Automation and Tooling
Leverage tooling to scale threat modeling across engineering teams:| Tool Category | Examples | Use Case |
|---|---|---|
| Diagramming | Microsoft Threat Modeling Tool, OWASP Threat Dragon | Visual DFD creation with STRIDE analysis |
| Threat-as-code | Threagile, PyTM | YAML-based models with CI/CD integration |
| Attack simulation | MITRE ATT&CK Navigator | Mapping threats to known techniques |
| Risk management | IriusRisk, ThreatModeler | Enterprise threat modeling platforms |
Threat Modeling Techniques
Adversary-Centric Analysis
Enumerate abuse cases and adversary objectives before cataloging generic threats. Understanding what attackers want to achieve focuses threat modeling on realistic attack scenarios rather than theoretical possibilities. Key resources for adversary-centric modeling:- MITRE ATT&CK Framework — Catalog of adversary tactics, techniques, and procedures
- Cyber Kill Chain — Attack lifecycle stages from reconnaissance to objectives
- CAPEC — Common Attack Pattern Enumeration and Classification
- Industry-specific threat intelligence (FS-ISAC, H-ISAC, etc.)
Risk-Based Prioritization
Prioritize threats using a structured approach rather than treating all threats equally:| Priority | Impact | Exploitability | Response |
|---|---|---|---|
| Critical | High blast radius | Easy to exploit | Immediate mitigation required |
| High | Significant impact | Moderate difficulty | Address before release |
| Medium | Limited impact | Requires expertise | Plan remediation |
| Low | Minimal impact | Difficult to exploit | Accept or defer |
Mitigation Acceptance Criteria
Define acceptance criteria for mitigations before implementation:- Security tests — Automated tests validating control effectiveness
- Policies — Configuration requirements and compliance checks
- Metrics — Observable indicators of control operation
- Monitoring — Detection mechanisms for control bypass
- Recovery procedures — Response plans if controls fail
Threat Model Outputs to Security Controls
Threat modeling directly informs security control selection across multiple domains:| Control Domain | Threat Types Addressed | Example Controls | Reference Standards |
|---|---|---|---|
| Identity | Spoofing, Elevation of privilege | MFA, step-up auth, token scoping | NIST 800-63 |
| Data Protection | Tampering, Information disclosure | Encryption, integrity checks, data masking | NIST 800-57 |
| Network | DoS, Information disclosure | Segmentation, egress controls, SSRF protection | NIST 800-125B |
| Application | All STRIDE categories | Input validation, output encoding, rate limiting | OWASP ASVS |
Identity Controls
Threat modeling identifies authentication and authorization requirements:- Stronger authentication mechanisms for sensitive operations
- Step-up authentication based on transaction risk
- Appropriate token scopes and lifetime limits
- Confused deputy mitigations for delegated authority
Data Protection Controls
Data-focused threats drive protection requirements:- Encryption boundary decisions based on trust boundaries
- Data minimization to reduce disclosure impact
- Integrity verification for tamper detection
- Tamper-evident logging for non-repudiation (see OWASP Logging Cheat Sheet)
Network Controls
Network threat analysis informs architecture decisions:- Segmentation requirements based on trust boundaries
- Egress control policies limiting outbound connections
- SSRF protections for server-side request handling
- Internal API authentication requirements
Application Controls
Application-level threats require defense-in-depth controls:- Input validation based on expected data types and ranges
- Output encoding appropriate to rendering context
- Secure deserialization with allowlists
- Rate limiting based on abuse scenario analysis
Review Cadence and Maintenance
Regular Review Triggers
Establish a consistent review cadence for threat models:| Review Trigger | Timing | Focus Areas |
|---|---|---|
| Design phase | Before implementation begins | Architecture threats, control requirements |
| Pre-GA | Before production launch | Complete threat coverage, mitigation validation |
| Post-incident | After security events | Gap analysis, model updates |
| Annual review | Critical systems | Drift detection, new threat patterns |
| Material changes | As needed | Specific architectural modifications |
Continuous Improvement
Measure threat modeling effectiveness through key metrics:- Coverage — Percentage of projects with current threat models
- Timeliness — Threat models completed before implementation
- Effectiveness — Security issues prevented vs. discovered post-deployment
- Velocity — Time from trigger event to completed threat model
Conclusion
Threat modeling methodologies provide structured approaches to identifying security risks and designing appropriate controls. Security engineers establish threat modeling as continuous practice integrated into software development lifecycle, with clear ownership, automation, and regular review. Success requires treating threat modeling as engineering practice rather than security ceremony, with practical outputs that inform design decisions and security testing. Organizations that invest in threat modeling fundamentals build more secure systems while reducing costly post-deployment security remediation.References
- Microsoft STRIDE Threat Modeling — Official STRIDE methodology documentation
- OWASP Threat Modeling Cheat Sheet — Practical threat modeling guidance
- MITRE ATT&CK Framework — Adversary tactics, techniques, and procedures knowledge base
- NIST SP 800-154 — Guide to Data-Centric System Threat Modeling
- Carnegie Mellon SEI OCTAVE — Operationally Critical Threat, Asset, and Vulnerability Evaluation
- Threat Modeling: Designing for Security — Adam Shostack’s comprehensive threat modeling reference

