Back to roadmap
Threat modeling

Threat Modeling Study Plan

A practical roadmap for product security, application security, security engineering, and anyone who needs threat modeling fundamentals.

Threat modeling is a structured way to identify, analyze, and mitigate security threats early. Use it to understand assets, trust boundaries, actors, data flows, vulnerabilities, impact, and risk treatment.

Expected pace

1-2 months

With hands-on modeling practice.

Important notes

Product security, AppSec, and security engineering roles need this plan heavily.
Every security professional should still understand the fundamentals.
Earlier threat modeling produces better security decisions.
Use OWASP Threat Modeling Cheat Sheet for baseline understanding.

Threat Modeling Objectives

Conduct threat modeling to investigate these areas before risk treatment decisions.

Trust boundaries to and within the application.
Actors inside and outside trust boundaries.
Information flows within, to, and from trust boundaries.
Information persistence inside and outside trust boundaries.
Threats to trust boundaries, information flow, and persistence.
Vulnerabilities at trust boundaries and in information flow or persistence.
Threat agents that can exploit vulnerabilities.
Impact of exploitation by a threat agent.
Decision tree to treat risk.
What is Threat ModelingThreat Modeling FundamentalsMethodologiesProcess and ToolsAdvanced Topics and PracticeThreat Modeling Tools to ExploreResources to Learn and PracticeVideo ResourcesBooks

Section 1

What is Threat Modeling

Threat modeling identifies, quantifies, and addresses application security risks so security work and risk acceptance align better with business priorities.

Identify assets that need protection.
Analyze likely threats and attacks against those assets.
Develop strategies to mitigate or eliminate threats.
Prioritize security initiatives using informed risk decisions.
Improve risk acceptance decisions with business context.

Section 2

Threat Modeling Fundamentals

2 weeks

Understand the why and what of threat modeling: assets, threats, weaknesses, mitigations, and the four core questions.

Week 1-2: Core Concepts

Definition: identifying, analyzing, and mitigating potential security threats.
Why it matters: proactive identification, cost efficiency, and prioritization.
Assets: what are we protecting?
Threats: what can go wrong?
Vulnerabilities: where are we weak?
Mitigations: what are we going to do about it?
Question 1: What are we building?
Question 2: What can go wrong?
Question 3: What are we going to do about it?
Question 4: Did we do a good job?

Section 3

Methodologies

2 weeks

Learn structured approaches for finding threats, especially STRIDE, then compare risk, scoring, attack-path, and privacy models.

Week 3-4: Frameworks

STRIDE: Spoofing, Tampering, Repudiation, Information Disclosure, Denial of Service, Elevation of Privilege.Focus heavily
PASTA: Process for Attack Simulation and Threat Analysis.Risk-centric
Attack Trees: visualize attack paths.
CVSS: scoring model.
DREAD: scoring model.
LINDDUN: privacy threat modeling.

Section 4

Process and Tools

2 weeks

Learn how to run threat modeling in real projects using DFDs, scope decomposition, threat identification, mitigation, and validation.

Week 5-6: Execution

Data Flow Diagrams: trust boundaries.
Data Flow Diagrams: processes, data stores, data flows, and external entities.
Process: define scope -> decompose application -> identify threats -> mitigate -> validate.
OWASP Threat Dragon: open source web/desktop tool.
Microsoft Threat Modeling Tool: classic standard.
Threagile: agile, code-driven threat modeling.

Section 5

Advanced Topics and Practice

2 weeks

Scale threat modeling and integrate it into SDLC, Agile, DevOps, validation, testing, and cloud/product practice.

Week 7-8: Scaling and Integration

Fit threat modeling into Agile and DevOps with rapid threat modeling.
Validate mitigations through pentesting, unit tests, and other verification.
Practice: model a simple web app.
Practice: model cloud infrastructure such as an S3 bucket setup.
Practice: model a CI/CD pipeline.

Section 7

Resources to Learn and Practice

Use these references for fundamentals, examples, cloud modeling, mind maps, podcasts, and certification paths.