| name | threat-modeling |
|---|---|
| description | Perform threat modeling for a system or feature. Use when a senior developer needs security risk assessment. |
Perform threat modeling for a system or feature.
- Architecture diagram or description.
- Assets and trust boundaries.
- Known threats or compliance needs.
- Define assets, trust boundaries, and attack surface.
- Enumerate threats using a structured method.
- Propose mitigations and residual risks.
- Threat model summary with mitigations.
- Track residual risk and acceptance.
- Document assumptions and scope.