Master threat modeling through interactive visual examples and real-world scenarios.
A structured approach to identifying security threats in your system before attackers do. Think like a burglar to secure your house.
Six categories of security threats. For every component in your system, ask yourself these questions.
Identity theft and impersonation attacks
Can someone pretend to be another user or system?
Common Examples
Unauthorized data modification
Can data be modified without detection?
Common Examples
Denying performed actions
Can users deny their actions without proof?
Common Examples
Data leaks and exposure
Can sensitive data be accessed by unauthorized parties?
Common Examples
System availability attacks
Can the system be made unavailable to legitimate users?
Common Examples
Unauthorized access escalation
Can users gain higher privileges than allowed?
Common Examples
A systematic approach to finding and fixing security weaknesses before they become problems.
Define your system architecture, zones, and data flows
Apply STRIDE to find potential threats
Rate severity and likelihood of each threat
Design controls and countermeasures