14 Tweets 3 reads Jul 18, 2023
🧵 12 Threat Modeling Methods…
1. PASTA
Process for Attack Simulation and Threat Analysis (PASTA) combines business objectives and technical requirements.
It involves key decision-makers and produces threat enumeration and scoring.
2. STRIDE
The most mature method evaluates system design, identifies threats, and applies known threats based on its mnemonic name.
3. LINDDUN
Focuses on privacy concerns, using a systematic approach to privacy assessment.
Identifies threats' applicability to the system by analyzing threat categories and building threat trees.
4. CVSS
The Common Vulnerability Scoring System (CVSS) provides a standardized scoring system for vulnerabilities.
Consists of three metric groups and is often combined with other threat-modeling methods.
5. Attack Trees
Attack trees depict attacks on a system in tree form, with the goal as the root and ways to achieve it as leaves.
This method is widely used with other techniques like STRIDE, CVSS, and PASTA.
6. PnG
Persona non Grata focuses on human attackers' motivations and skills.
By understanding potential attackers' perspectives, PnG helps identify system vulnerabilities and fits well into Agile approaches.
7. Security Cards
A brainstorming technique that helps identify unusual and complex attacks.
Use a deck of cards to answer questions about potential attacks and explore threat dimensions.
8. hTMM:
The Hybrid Threat Modeling Method combines SQUARE, Security Cards, and PnG activities.
It aims for consistent results, no false positives, and cost-effectiveness in threat modeling.
9. Quantitative Threat Modeling Method:
Combines attack trees, STRIDE, and CVSS to address complex interdependencies among components in cyber-physical systems.
It quantifies risk through component attack trees and CVSS scores.
10. Trike:
A security audit framework that uses threat modeling.
It defines system requirements, builds actor-asset-action matrices, and generates attack trees to assess risks from privilege elevations and denials of service.
11. VAST Modeling
Based on an automated threat-modeling platform called ThreatModeler.
It creates application and operational threat models, integrating into the organization's development and DevOps lifecycles.
12. OCTAVE
The Operationally Critical Threat, Asset, and Vulnerability Evaluation is a risk-based method for cybersecurity.
It assesses organizational risks, infrastructure vulnerabilities, and develops security strategies and plans.
Thanks for reading.
If you enjoyed this thread:
1. Follow me @RealTonyMao
2. RT the first tweet below to share it

Loading suggestions...