Threat Modeling

  1. Threat Identification and Enumeration
    1. Threat Identification Methodologies
      1. Attacker-Centric Approaches
        1. Adversary Profiles
          1. Attack Vectors
          2. Asset-Centric Approaches
            1. Asset Value Assessment
              1. Asset Exposure Analysis
              2. Software-Centric Approaches
                1. Vulnerability Analysis
                  1. Component Mapping
                2. The STRIDE Framework
                  1. Spoofing Identity
                    1. Authentication Weaknesses
                      1. Impersonation Attacks
                      2. Tampering with Data
                        1. Data Integrity Violations
                          1. Unauthorized Modifications
                          2. Repudiation
                            1. Lack of Audit Trails
                              1. Non-Repudiation Mechanisms
                              2. Information Disclosure
                                1. Data Leakage
                                  1. Privacy Violations
                                  2. Denial of Service
                                    1. Resource Exhaustion
                                      1. Service Disruption
                                      2. Elevation of Privilege
                                        1. Privilege Escalation
                                          1. Bypass of Authorization
                                        2. Other Threat Enumeration Frameworks
                                          1. PASTA
                                            1. Attack Simulation
                                              1. Threat Analysis Steps
                                              2. LINDDUN
                                                1. Privacy Threats
                                                  1. Mapping to DFDs
                                                  2. TRIKE
                                                    1. Risk Management Focus
                                                      1. Asset and Actor Modeling
                                                      2. OCTAVE
                                                        1. Organizational Risk Assessment
                                                          1. Asset-Driven Analysis
                                                        2. Using Attack Trees
                                                          1. Defining a Root Goal
                                                            1. Decomposing into Sub-Goals
                                                              1. Identifying Leaf Nodes
                                                                1. AND/OR Conditions
                                                                  1. Visualizing Attack Paths
                                                                  2. Threat Libraries and Knowledge Bases
                                                                    1. CAPEC
                                                                      1. Attack Pattern Catalog
                                                                        1. Usage in Threat Modeling
                                                                        2. MITRE ATT&CK Framework
                                                                          1. Tactics and Techniques
                                                                            1. Mapping to Real-World Attacks