These technical notes provide information on threat modeling with Microsoft’s Threat Modeling Tool:
Table of contents
- How do I update the initial diagrams
- How to audit false positives
- How to audit mitigated threats
- How to audit unmitigated threats
- How to get started analyzing an application threat model
- How to get started drawing application threat model diagrams
- Spoofing (STRIDE)
- Tampering (STRIDE)
- Repudiation (STRIDE)
- Information Disclosure (STRIDE)
- Denial of Service (STRIDE)
- Elevation of Privilege (STRIDE)