Skip to content

Next Bootcamp Edition
May 4th, 2026

Threat Modeling

A structured process for identifying, analyzing, and addressing potential security threats to a system or application by examining its architecture, data flows, and trust boundaries to prioritize security controls.

Author
Unihackers Team
Reading time
3 min read
Last updated

Why It Matters

Threat modeling shifts security left in the development lifecycle by identifying risks during design, when changes are cheapest. Fixing a security flaw in design costs a fraction of addressing it in production. Yet many organizations skip this practice, discovering vulnerabilities only through expensive penetration tests or, worse, actual breaches.

The practice forces structured thinking about security. Rather than ad-hoc "what could go wrong?" discussions, threat modeling provides frameworks for systematically examining systems, identifying threats, and prioritizing mitigations. This rigor ensures comprehensive coverage and documented decisions.

Threat modeling also improves communication between security teams and developers. Visual diagrams and structured threat lists create shared understanding of risks. Development teams understand why security controls matter; security teams understand technical constraints. This collaboration produces better security outcomes than adversarial security reviews.

For security professionals, threat modeling skills enable proactive impact. Instead of finding problems after the fact, you help prevent them by design. This strategic contribution distinguishes security architects and senior practitioners.

The Threat Modeling Process

Core Questions

Every threat model seeks to answer four fundamental questions:

  1. What are we building? (System description)
  2. What can go wrong? (Threat identification)
  3. What are we going to do about it? (Mitigations)
  4. Did we do a good job? (Validation)

System Decomposition

Document the system before analyzing threats:

system-decomposition.txt
Text

System Decomposition Elements:

Architecture Diagram:
- Components and their functions
- Technology stack
- Deployment environment

Data Flow Diagram (DFD):
- External entities (users, external systems)
- Processes (application components)
- Data stores (databases, files)
- Data flows between elements

Trust Boundaries:
- Where trust levels change
- Network segments
- Authentication boundaries
- Privilege transitions

Assets:
- Sensitive data handled
- Valuable functionality
- Business-critical operations

Threat Identification Frameworks

STRIDE

Microsoft's framework categorizes threats by type:

stride-framework.txt
Text

STRIDE Categories:

S - Spoofing Identity
  - Pretending to be another user or system
  - Mitigations: Authentication, certificates

T - Tampering with Data
  - Modifying data in transit or at rest
  - Mitigations: Integrity controls, signing, encryption

R - Repudiation
  - Denying actions were performed
  - Mitigations: Logging, digital signatures, audit trails

I - Information Disclosure
  - Exposing data to unauthorized parties
  - Mitigations: Encryption, access controls, data classification

D - Denial of Service
  - Making system unavailable
  - Mitigations: Rate limiting, redundancy, resource limits

E - Elevation of Privilege
  - Gaining unauthorized access or permissions
  - Mitigations: Least privilege, input validation, sandboxing

Applying STRIDE:

  • Examine each element in the data flow diagram
  • Consider each STRIDE category for that element
  • Document applicable threats

PASTA (Process for Attack Simulation and Threat Analysis)

Seven-stage risk-centric methodology:

pasta-framework.txt
Text

PASTA Stages:

1. Define Business Objectives
 - Business goals and priorities
 - Compliance requirements
 - Risk tolerance

2. Define Technical Scope
 - System boundaries
 - Components and dependencies
 - Technology stack

3. Application Decomposition
 - Data flow diagrams
 - Trust boundaries
 - Entry points

4. Threat Analysis
 - Threat intelligence
 - Attack patterns
 - Relevant vulnerabilities

5. Vulnerability Analysis
 - Security weaknesses
 - Design flaws
 - Implementation issues

6. Attack Modeling
 - Attack trees
 - Exploitation scenarios
 - Kill chain analysis

7. Risk and Impact Analysis
 - Business impact assessment
 - Risk prioritization
 - Mitigation recommendations

DREAD (Scoring Model)

Risk rating framework for prioritizing threats:

FactorQuestion
DamageHow severe is the damage?
ReproducibilityHow easy to reproduce?
ExploitabilityHow easy to exploit?
Affected UsersHow many users impacted?
DiscoverabilityHow easy to discover?

Score each factor 1-10, sum for overall risk rating.

Practical Threat Modeling

Workshop Format

workshop-format.txt
Text

Threat Modeling Workshop (2-3 hours):

Participants:
- Development team leads
- Security representative
- Architect/tech lead
- Optional: Product owner

Preparation (before meeting):
- Architecture diagrams ready
- System context documented
- Data sensitivity identified

Session Flow:

1. Context Setting (15 min)
 - System overview
 - Business value
 - Security requirements

2. Diagram Review (30 min)
 - Walk through architecture
 - Validate data flows
 - Identify trust boundaries

3. Threat Identification (60 min)
 - Apply STRIDE to each element
 - Brainstorm attack scenarios
 - Document all potential threats

4. Prioritization (30 min)
 - Rate threat severity
 - Consider likelihood
 - Identify top concerns

5. Mitigation Planning (30 min)
 - Discuss countermeasures
 - Assign action items
 - Document decisions

Documentation Template

threat-model-template.txt
Text

Threat Model Document:

1. Overview
 - System name and purpose
 - Scope and boundaries
 - Date and participants

2. System Description
 - Architecture diagram
 - Data flow diagram
 - Technology stack
 - Trust boundaries

3. Assets
 - Data classifications
 - Critical functions
 - Sensitive components

4. Threat Analysis
 | ID | Threat | Category | Asset | Severity | Mitigation |
 |----|--------|----------|-------|----------|------------|
 | T1 | SQLi in search | Tampering | DB | High | Parameterized queries |
 | T2 | Session hijacking | Spoofing | Auth | High | Secure cookies, HTTPS |

5. Risk Decisions
 - Accepted risks (with justification)
 - Deferred items
 - Out of scope

6. Action Items
 - Assigned mitigations
 - Timeline
 - Verification plan

Tools and Automation

Microsoft Threat Modeling Tool

  • Free graphical tool
  • Template-based threat generation
  • STRIDE methodology built-in
  • Report generation

OWASP Threat Dragon

  • Open-source alternative
  • Web-based interface
  • Cross-platform support
  • STRIDE and LINDDUN support

Integration with Development

sdlc-integration.txt
Text

SDLC Integration Points:

Design Phase:
- New feature threat models
- Architecture reviews
- Security requirements derivation

Development:
- Reference model during implementation
- Security testing priorities
- Code review focus areas

Testing:
- Test cases from threat model
- Penetration testing scope
- Security acceptance criteria

Operations:
- Monitoring requirements
- Incident response scenarios
- Security control validation

Career Relevance

Threat modeling skills demonstrate security architecture thinking. The practice appears in security architect roles, application security positions, and senior engineering responsibilities.

Roles Using Threat Modeling (US Market)

RoleEntry LevelMid LevelSenior
Application Security Engineer$90,000$120,000$160,000
Security Architect$115,000$145,000$190,000
Product Security Engineer$100,000$135,000$175,000

Source: CyberSeek

In the Bootcamp

How We Teach Threat Modeling

In our Cybersecurity Bootcamp, you won't just learn about Threat Modeling in theory. You'll practice with real tools in hands-on labs, guided by industry professionals who use these concepts daily.

Covered in:

Module 8: Advanced Security Operations

Related topics you'll master:Incident ResponseDFIRThreat HuntingVolatility
See How We Teach This

360+ hours of expert-led training • 94% employment rate