Kernel of Truth

Threat Modelling Frameworks: Identifying and Managing Cyber Risks

Threat Modelling Frameworks: Identifying and Managing Cyber Risks

Threat modelling is a proactive cybersecurity process used to identify, prioritise, and mitigate potential threats before they can be exploited. It’s a vital part of secure system design, helping teams anticipate vulnerabilities, understand attacker goals, and build security into applications and infrastructure from the start.


🛠️ What Is Threat Modelling?

Threat modelling answers four fundamental questions:

  1. What are we building?
  2. What can go wrong?
  3. What are we doing about it?
  4. Have we done a good enough job?

By applying structured thinking frameworks, organisations can anticipate attacks, reduce risk, and improve resilience — all while aligning with DevSecOps and regulatory requirements.


🧩 Common Threat Modelling Frameworks

🔍 1. STRIDE (Microsoft)

A classic model developed by Microsoft, used primarily in application and system design.

STRIDE CategoryDescription
SpoofingImpersonating users or systems
TamperingModifying data or code
RepudiationDenying actions or transactions
Information DisclosureLeaking sensitive data
Denial of ServiceDisrupting service availability
Elevation of PrivilegeGaining unauthorised privileges

STRIDE is typically used during the design phase to evaluate components, data flows, and trust boundaries.


🔢 2. DREAD (Microsoft, Deprecated)

Formerly used for prioritising threats, based on 5 factors:

DREAD MetricWhat It Measures
Damage potentialHow bad would the attack be?
ReproducibilityHow easy is it to reproduce the attack?
ExploitabilityHow easy is it to launch the attack?
Affected usersHow many users would be impacted?
DiscoverabilityHow easy is it to discover the threat?

DREAD is no longer widely used due to subjectivity concerns, but can still inform internal risk ratings.


🧪 3. PASTA (Process for Attack Simulation and Threat Analysis)

A risk-centric framework that aligns with business impact.

PASTA StagePurpose
1. Define business objectivesWhat are we protecting?
2. Define technical scopeIdentify assets, interfaces, boundaries
3. Decompose the applicationUnderstand data flows and architecture
4. Threat analysisUse attacker models and scenarios
5. Vulnerability analysisIdentify weaknesses
6. Attack modellingSimulate attacks
7. Risk and impact analysisPrioritise based on business value

PASTA is suited for complex, high-value applications, especially in regulated industries.


🧠 4. MITRE ATT&CK

A globally curated knowledge base of real-world adversary tactics and techniques.

  • Used for post-exploitation threat modelling and defensive gap analysis
  • Helps map threats to real attacker behaviour (e.g. lateral movement, privilege escalation)
  • Commonly used in SOC playbooks, threat emulation, and purple teaming

Unlike STRIDE and PASTA, ATT&CK is not design-phase focused, but excels in operational threat modelling and adversary mapping.


🛠️ 5. LINDDUN

A privacy-focused threat modelling framework.

LINDDUN CategoryDescription
LinkabilityIdentifying linkable user data
IdentifiabilityPersonal data exposure risks
Non-repudiationVerifiable actions and records
DetectabilitySystem observability by attackers
Disclosure of InformationUnintended data leakage
Unauthorised ActionsPolicy violations and misuse
Non-complianceFailing to meet privacy obligations

LINDDUN is valuable for GDPR, HIPAA, and other privacy-by-design efforts.


🧠 When to Use Each Framework

FrameworkBest Used For
STRIDEEarly-stage design of systems and apps
PASTABusiness-aligned risk modelling
MITRE ATT&CKThreat emulation and SOC operations
LINDDUNPrivacy impact assessments
DREAD(Optional) Risk prioritisation (legacy use)

✅ Summary

Threat modelling is essential for proactively addressing security and privacy risks in software and infrastructure. By using frameworks like STRIDE, PASTA, and MITRE ATT&CK, teams can systematically analyse threats, understand attacker behaviour, and make informed decisions to reduce risk.

Whether you’re securing a new app, mapping adversary behaviour, or aligning with compliance — there’s a threat modelling framework to match your goals.


🔗 Resources

NCSC Latest