Skip to content

Latest commit

 

History

History
26 lines (20 loc) · 661 Bytes

File metadata and controls

26 lines (20 loc) · 661 Bytes
name threat-modeling
description Perform threat modeling for a system or feature. Use when a senior developer needs security risk assessment.

Threat Modeling

Purpose

Perform threat modeling for a system or feature.

Inputs to request

  • Architecture diagram or description.
  • Assets and trust boundaries.
  • Known threats or compliance needs.

Workflow

  1. Define assets, trust boundaries, and attack surface.
  2. Enumerate threats using a structured method.
  3. Propose mitigations and residual risks.

Output

  • Threat model summary with mitigations.

Quality bar

  • Track residual risk and acceptance.
  • Document assumptions and scope.