Skip to content
ThreatModeler 7.3 is now available - build threat models faster at every step! Get the details

2

Threat Modeling
101

Introducing the ThreatModeler glossary

Jump to:
A

Attack surface management: The move to cloud poses unique challenges as organizations adapt to securing infrastructure as code for all applications, while being prepared to secure brave new features such as containers, microservices and automatic scaling. Threat modeling, traditionally a manual process, would take weeks to enumerate potential threats with diagramming tools or whiteboarding to gain an understanding of your attack surface.

Automated Threat Modeling: What Is Automated Threat Modeling? Automated threat modeling enhances traditional threat modeling by introducing AI and other advanced technologies to improve how models are built, and risks are assessed. This helps provide real-time insights into vulnerabilities and security gaps and enhances efficiency, accuracy, and consistency in threat detection and response.  By combining AI, threat frameworks,…

B

Blockchain Security and Threat Modeling: What Is Blockchain? Blockchain technology is a distributed digital ledger for recording and verifying transactions without the need for a central authority. Blockchain derives its name from how it works: Transaction data is organized into blocks, then linked together into a chain that serves as a chronological record of those transactions.  Blockchain operates on a…

C

Cloud Threat Modeling: What Is Cloud Threat Modeling? Cloud threat modeling focuses on identifying and addressing threats in cloud environments, which require specialized security considerations due to their complexity and dynamism. With the widespread adoption of cloud and hybrid and multi-cloud strategies, cloud threat modeling is crucial for attaining and maintaining a robust security posture for today’s businesses….

Cyber Risk Management: What Is Cyber Risk Management? The term “cyber risk” broadly describes any threat, vulnerability, or exposure (such as regulatory compliance) that could damage or disrupt an organization’s IT systems, business operations, or reputation. Effective cyber risk management proactively identifies and assesses threats to reduce the likelihood and potential severity of attacks.  Because threats come in…

Cyber Risk, Cyber Threat, Cyber Vulnerability: What Is a Cyber Risk? A cyber risk is an exposure to a potentially damaging and/or disruptive event affecting an organization’s IT systems, data, business operations, and/or reputation. Taken as a whole, cyber risk generally comprises three elements: threats, vulnerabilities, and impact (i.e., specific potential negative consequences).  What Is a Cyber Threat? A cyber threat…

O

OCTAVE Threat Methodology: What Is OCTAVE? OCTAVE is a framework for detecting, categorizing, and prioritizing threats and vulnerabilities in applications and IT systems, primarily for small to midsize businesses. Short for Operationally Critical Threat, Asset, and Vulnerability Evaluation, the OCTAVE methodology employs a business-oriented approach that focuses on quantitative risk weighting and organizational risks to protect assets.  What…

Operational Threat Modeling: What Is Operational Threat Modeling? A distinct practice within the broader field of threat modeling, operational threat modeling provides a holistic view of an organization’s infrastructure, people, and processes, allowing teams to visualize and manage threats across an entire operational environment. This enables security teams to develop mitigation strategies to manage infrastructure risk and align…

P

PASTA Threat Methodology: What Is PASTA? The Process for Attack Simulation and Threat Analysis (PASTA) is a seven-step methodology for simulating attacks that combines an attacker-centric technical analysis with assessing and minimizing business risks and impacts. Developed in 2015 to address shortcomings found in other threat modeling frameworks, PASTA is designed to be scalable and adaptable to the…

S

Security Countermeasures: What Are Security Countermeasures? Security countermeasures include any technology, policy, or practice that help mitigate risk by reducing the vulnerability of IT systems, protecting against cyber threats, or helping meet security requirements. Security countermeasures can be technical, administrative, or physical controls, and can be categorized as:  Security countermeasures can be layered in what is known…

STRIDE Threat Framework: What Is STRIDE? STRIDE is a framework for detecting, categorizing, and prioritizing potential threats to and vulnerabilities of applications and IT systems. It was one of the first and best-known frameworks for threat modeling, created by two Microsoft engineers in 1999 to help software developers remember confidentiality, integrity, and availability (CIA) requirements during early stages…

T

Threat Analysis: What Is an Attack Surface? An attack surface refers to all the points, interfaces, and avenues through which a bad actor can try to enter or extract information from a system, network, or application. These include: What Is Threat Analysis? Threat analysis involves identifying potential threats, understanding their severity and potential impact, and developing mitigation…

Threat Boundary: What Is a Threat Boundary? Also known as a trust boundary, a threat boundary is a dividing line or partition between areas of systems (whether internal or external) which may separate networks, applications, or organizations, as well as different security classifications of data. Threat boundaries define where security controls should be implemented between trust zones…

Threat Intelligence Framework: What Is a Threat Intelligence Framework? A threat intelligence framework is a structured system that gathers, analyzes, and applies threat data to improve organizational defenses. It helps teams make informed decisions based on real-time data, enabling better preparedness against cyber risks [link to TM glossary article]. Threat intelligence frameworks generally entail several discrete phases: setting…

Threat Library: What Is a Threat Library? A threat library is a central repository for threat intelligence, including information about known threats, vulnerabilities, and attack methods, as well as predefined security patterns and templates for creating threat models. A well-built threat library serves as a knowledge base for security teams, providing the essential data and context to…

Threat Modeling Methodologies and Methods: What Is a Threat Modeling Methodology? A threat modeling methodology is a structured approach used to identify, analyze, and mitigate security threats in applications and systems. Many methodologies—such as STRIDE, PASTA, OCTAVE, and VAST—have been developed in recent decades, each blending their own unique processes with generally accepted principles. Typically, a given methodology focuses on…

Trust Zone: What Is a Trust Zone? A trust zone comprises a single element or group of elements in a system or network with shared trust levels and security expectations. Not all data in a system requires the same level of security: Highly sensitive data—such as customer information, financial records, or intellectual property—should have a commensurate level…

V

VAST Threat Methodology: What Is VAST? Short for Visual, Agile, and Simple Threat modeling, VAST is a threat modeling framework for detecting, categorizing, and prioritizing potential threats to and vulnerabilities of enterprise applications and IT systems. Based on agile DevOps principles, VAST enables scalable threat modeling across large enterprises and produces actionable outputs for security and DevOps teams. …