Security DesignMedium
Threat Modeling
A structured approach to identifying, analyzing, and mitigating potential threats to a system
Content
What is Threat Modeling?
Threat Modeling helps teams proactively identify where a system could be attacked and plan countermeasures. It’s typically done during the design phase but can be revisited continuously.
Key Steps
- Identify assets and users
- Define system architecture
- List threats and vulnerabilities
- Prioritize risks
- Document and fix weaknesses
Best Practices
- Involve cross-functional teams
- Model early and update often
- Choose a methodology that suits the project
- Don’t just list — mitigate
Quick Facts
Severity Level
7/10
Goal
Think like an attacker
When
During system design
Methodologies
STRIDE, PASTA, DREAD
Example
Mapping how data flows and where it’s at risk
Related Terms