Skip to content

Practical Threat Modeling

Benjamin-Yves Trapp edited this page Jan 5, 2022 · 2 revisions

Welcome - This guide will be focussing on how to do threat modeling and will be using Microsoft's MSTMT app.

The prepared Templates:

can be used with the tool, making it easier to create a model based on applications, services in the context of the cloud. They are based on the Threat Modeling Manifesto philosophy.

Threat Modeling is handled in following steps:

  1. Tool-Preparation:

    • Download MS-TMT app
    • Download the stencils you're interrested in
  2. MODEL-Preparation: This step involves

    • preparing a system's interaction diagram or deployment architecture
    • specifying the trust boundaries Reuse existing system design diagrams and apply trust boundaries as necessary. Note that it is not necessary to get all the interactions correct in the first phase. You can have a simplistic view and then later keep on adding new entities/components to your model and apply new trust boundaries.
  3. Report Generation: Once the model is prepared click on "Switch to Analysis View" to check all the detected threats.

    To get a detailed report use:

    "Reports -> Create Full Report...". The report would be saved in an HTML file.

  4. Threat analysis: For the reported threats provide an analysis, stating whether

    • the threat needs investigation
    • it is "not applicable" and provide a justification
    • it is Mitigated because of some action taken
Clone this wiki locally