This document provides an overview of threat modeling:
- Threat modeling involves identifying threats and mitigations within a defined scope by having development and security teams discuss application architecture and assets.
- It is useful to do early in development as it makes vulnerabilities easier to fix and teaches a security mindset.
- A threat modeling session involves mapping the application, finding threats by considering attacker perspectives and mitigation strategies, and generating follow-up tasks.
- Threat modeling tools, documentation, and assigning findings help structure the process.