Learn by Directing AI
All materials

threat-model-template.md

Threat Model Template (STRIDE)

System: [Name of the system being modeled] Date: [Date of threat modeling] Author: [Your name / engagement reference]

Fill in each category below for the specific system under assessment. Consider the system's architecture, its users, its data, and its business context.


Spoofing

Can someone pretend to be a legitimate user, service, or system?

Threats identified:

Assets at risk:

Existing controls:

Residual risk:


Tampering

Can someone modify data, configurations, or code without authorization?

Threats identified:

Assets at risk:

Existing controls:

Residual risk:


Repudiation

Can someone deny performing an action, and would the system have evidence?

Threats identified:

Assets at risk:

Existing controls:

Residual risk:


Information Disclosure

Can someone access data they should not be able to see?

Threats identified:

Assets at risk:

Existing controls:

Residual risk:


Denial of Service

Can someone prevent legitimate users from accessing the system?

Threats identified:

Assets at risk:

Existing controls:

Residual risk:


Elevation of Privilege

Can someone gain capabilities beyond what they should have?

Threats identified:

Assets at risk:

Existing controls:

Residual risk: