A proactive cybersecurity practice used to systematically identify, assess, and mitigate potential security threats before systems are attacked. Rather than reacting to incidents, organizations use threat modeling during design, development, and planning to understand what could go wrong, how, and with what business impact.
Threat modeling answers four core questions:
2. What can go wrong?
→ Identify threats, vulnerabilities,
and attack paths.
3. What are we going to do about it?
→ Decide security controls and
mitigations.
4. Did we do a good job?
→ Validate, test, and review
assumptions.
This makes threat modeling both technical and business-oriented.
Threat modeling helps organizations:
Instead of protecting everything equally, threat modeling focuses on what matters most.
What needs protection?
Potential ways an attacker could cause harm, such as:
Weaknesses that threats can exploit:
What happens if the threat succeeds?
This is where threat modeling directly supports business decision-making.

Shostack popularized the STRIDE model, which categorizes threats into six types:
STRIDE helps teams systematically think through threats rather than guessing.

Imagine a CRM system:
This shows how threat modeling connects technology → risk → business impact → solution.

Why Shostack emphasizes “proactive”
According to Adam Shostack, threat modeling should be:
This mindset shifts security from being a technical afterthought to a strategic capability.

Threat modeling is a structured, proactive method for identifying and analyzing security threats and vulnerabilities by linking system weaknesses to potential business impacts, enabling informed risk-based security decisions.
Copyright © 2025 JEAN ALBERTSEN - All Rights Reserved.