Components Security Templates ThreatModeling - DevClusterAI/DOD-definition GitHub Wiki
Threat Modeling Template
Project Information
Project Name: [Project Name]
Version/Release: [Version]
Date: [YYYY-MM-DD]
Participants: [Names/Roles of participants]
Facilitator: [Name/Role]
System Overview
System Description
[Provide a brief description of the system/application being analyzed]
Business Objectives
[List the primary business objectives this system fulfills]
Data Flow Diagram (DFD)
[Include or reference a data flow diagram showing components, data flows, trust boundaries]
Assets and Trust Boundaries
Key Assets
Asset |
Description |
Classification |
Owner |
[Asset 1] |
[Description] |
[Critical/Sensitive/Public] |
[Role/Team] |
[Asset 2] |
[Description] |
[Critical/Sensitive/Public] |
[Role/Team] |
[Asset 3] |
[Description] |
[Critical/Sensitive/Public] |
[Role/Team] |
Trust Boundaries
Boundary |
Description |
Systems/Components Within |
[Boundary 1] |
[Description] |
[List of components] |
[Boundary 2] |
[Description] |
[List of components] |
[Boundary 3] |
[Description] |
[List of components] |
Threat Identification (STRIDE)
Component 1: [Component Name]
Threat Type |
Threat Scenario |
Likelihood |
Impact |
Risk Rating |
Spoofing |
[Description] |
[High/Medium/Low] |
[High/Medium/Low] |
[Critical/High/Medium/Low] |
Tampering |
[Description] |
[High/Medium/Low] |
[High/Medium/Low] |
[Critical/High/Medium/Low] |
Repudiation |
[Description] |
[High/Medium/Low] |
[High/Medium/Low] |
[Critical/High/Medium/Low] |
Information Disclosure |
[Description] |
[High/Medium/Low] |
[High/Medium/Low] |
[Critical/High/Medium/Low] |
Denial of Service |
[Description] |
[High/Medium/Low] |
[High/Medium/Low] |
[Critical/High/Medium/Low] |
Elevation of Privilege |
[Description] |
[High/Medium/Low] |
[High/Medium/Low] |
[Critical/High/Medium/Low] |
Component 2: [Component Name]
Threat Type |
Threat Scenario |
Likelihood |
Impact |
Risk Rating |
Spoofing |
[Description] |
[High/Medium/Low] |
[High/Medium/Low] |
[Critical/High/Medium/Low] |
Tampering |
[Description] |
[High/Medium/Low] |
[High/Medium/Low] |
[Critical/High/Medium/Low] |
Repudiation |
[Description] |
[High/Medium/Low] |
[High/Medium/Low] |
[Critical/High/Medium/Low] |
Information Disclosure |
[Description] |
[High/Medium/Low] |
[High/Medium/Low] |
[Critical/High/Medium/Low] |
Denial of Service |
[Description] |
[High/Medium/Low] |
[High/Medium/Low] |
[Critical/High/Medium/Low] |
Elevation of Privilege |
[Description] |
[High/Medium/Low] |
[High/Medium/Low] |
[Critical/High/Medium/Low] |
Data Flow 1: [Flow Description]
Threat Type |
Threat Scenario |
Likelihood |
Impact |
Risk Rating |
Spoofing |
[Description] |
[High/Medium/Low] |
[High/Medium/Low] |
[Critical/High/Medium/Low] |
Tampering |
[Description] |
[High/Medium/Low] |
[High/Medium/Low] |
[Critical/High/Medium/Low] |
Repudiation |
[Description] |
[High/Medium/Low] |
[High/Medium/Low] |
[Critical/High/Medium/Low] |
Information Disclosure |
[Description] |
[High/Medium/Low] |
[High/Medium/Low] |
[Critical/High/Medium/Low] |
Denial of Service |
[Description] |
[High/Medium/Low] |
[High/Medium/Low] |
[Critical/High/Medium/Low] |
Elevation of Privilege |
[Description] |
[High/Medium/Low] |
[High/Medium/Low] |
[Critical/High/Medium/Low] |
Mitigations
Threat ID |
Component/Flow |
Threat |
Mitigation |
Status |
Owner |
Priority |
[ID-1] |
[Component/Flow] |
[Brief threat] |
[Description of countermeasure] |
[Not Started/In Progress/Completed] |
[Role/Team] |
[High/Medium/Low] |
[ID-2] |
[Component/Flow] |
[Brief threat] |
[Description of countermeasure] |
[Not Started/In Progress/Completed] |
[Role/Team] |
[High/Medium/Low] |
[ID-3] |
[Component/Flow] |
[Brief threat] |
[Description of countermeasure] |
[Not Started/In Progress/Completed] |
[Role/Team] |
[High/Medium/Low] |
Attack Surface Reduction
Component/Area |
Current Attack Surface |
Recommendation |
Benefit |
[Component] |
[Description] |
[Recommendation] |
[Expected benefit] |
[Component] |
[Description] |
[Recommendation] |
[Expected benefit] |
[Component] |
[Description] |
[Recommendation] |
[Expected benefit] |
Risk Acceptance
Threat ID |
Risk Description |
Justification |
Accepted By |
Expiration/Review Date |
[ID-1] |
[Description] |
[Justification] |
[Name/Role] |
[YYYY-MM-DD] |
[ID-2] |
[Description] |
[Justification] |
[Name/Role] |
[YYYY-MM-DD] |
Security Requirements
Requirement ID |
Requirement |
Associated Threats |
Verification Method |
[REQ-1] |
[Description] |
[List of threat IDs] |
[Description] |
[REQ-2] |
[Description] |
[List of threat IDs] |
[Description] |
[REQ-3] |
[Description] |
[List of threat IDs] |
[Description] |
Threat Modeling Assumptions
- [Assumption 1]
- [Assumption 2]
- [Assumption 3]
Next Steps and Action Items
Action Item |
Owner |
Due Date |
Status |
[Description] |
[Name/Role] |
[YYYY-MM-DD] |
[Not Started/In Progress/Completed] |
[Description] |
[Name/Role] |
[YYYY-MM-DD] |
[Not Started/In Progress/Completed] |
[Description] |
[Name/Role] |
[YYYY-MM-DD] |
[Not Started/In Progress/Completed] |
Appendices
Glossary
[List of terms and definitions]
References
[List of reference materials]
Tools Used
[List tools used for threat modeling]
Approval
Threat Model Prepared By: [Name, Role]
Date: [YYYY-MM-DD]
Approved By: [Name, Role]
Date: [YYYY-MM-DD]