Skip to content

0xelitesystem/threat-modeling-worksheets

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

1 Commit
 
 
 
 
 
 
 
 
 
 

Repository files navigation

threat-modeling-worksheets

Seven worksheets covering the methodologies people actually use for threat modeling, plus five worked examples that show what the output looks like for real systems.

Worksheet structure

Every worksheet has three parts:

  1. Scope and when to use — what kind of system or analysis the methodology fits
  2. Template — the actual worksheet, fillable
  3. Pitfalls — failure modes the worksheet doesn't prevent

Worked example structure

Every example has four parts:

  1. System description and DFD — the system being modeled, with data flows
  2. Threats — applied to the methodology in question
  3. Top mitigations — ordered, with effort and impact estimates
  4. Pitfalls noticed — what was hard, what got missed in the first pass

Contents

Worksheets

# Worksheet Best for
01 STRIDE Per-component analysis of generic systems
02 LINDDUN Privacy-focused threats, especially for systems handling PII
03 PASTA Risk-driven, business-aligned threat modeling
04 Attack tree Decomposing a single high-impact attacker goal
05 Data flow diagram Building the input most other methodologies need
06 Trust boundary Identifying where data crosses authority levels
07 Abuse case Use-case mirror; useful in agile teams that already write user stories

Worked examples

# Example System type
01 Web app Standard web application with user accounts and a database
02 Mobile app Mobile client with offline data and a backend API
03 ML pipeline Training and serving pipeline for a production model
04 IaC pipeline Terraform/Pulumi pipeline deploying cloud infrastructure
05 IoT device Connected device with cloud control plane

Intended use

Pick a methodology that matches the question you have. STRIDE for "what can go wrong with this component"; attack trees for "how could someone achieve this specific bad outcome"; LINDDUN if privacy is the point; PASTA if you need leadership to fund mitigations.

The worked examples are not templates to copy — they're examples of completed output, included so you know what "done" looks like for each methodology before you start.

Contributing

If you've used a methodology not covered here in production work, open a PR with a worksheet and at least one worked example. Worked examples are valued more than worksheets; methodologies have plenty of papers, applied examples are scarcer.

Related repositories

Part of a 10-repo security audit set.

Browser-based audit tools:

Reference collections:

License

MIT. See LICENSE.

About

Seven threat-modeling worksheets (STRIDE, LINDDUN, PASTA, attack tree, DFD, trust boundary, abuse case) plus five worked examples (web, mobile, ML, IaC, IoT).

Topics

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

 
 
 

Contributors