Threat Modeling Tools

Back to list of all Outcomes

Original Working Session content: Threat Modeling Tools


Synopsis and Takeaways

Following from the previous session (where the week’s aims have been defined) this session looked at the tools used in helping research threat models in-depth. Tools in this session have been identified as key candidates for further research. These are better than Excel, Visio, or a text editor in a manual process:

  • My app security
  • Threat dragon – OWASP
  • Threat spec
  • SD Elements Based on predefined templates (risk patterns), they model architecture that currently exists and are used regularly. These tools need to be used modularly during threat modelling with common data points. The outcome is targeted at pen testers or developers. Work should not follow a check-box type of implementation. Scalability has been raised as a concern. A dynamic list is better than a top ten list because threats can be added and update readily Attack trees require a lot of work to function at a high level and are slow to perform. However, these can be used for a completeness check. The Idea is to focus attack trees on a certain area of interest.

  • We need to
    • Develop a tool to produce evidence-based outputs so big data will not be a problem.
    • Increase awareness and accountability for developers who don’t understand the data flow or how the application stack works
    • Develop a help guide for developers with security unit tests in mind
    • Help with automation on the developer’s side with input from security personal


We defined the approach used and what is threat modelling used for. Users were surveyed on Threat modelling approaches and tool desirables.
We defined the must haves for threat modelling tools:

  • DFD o Be able to upload the DFD
  • Attack trees o Ability to support attack trees
  • Threat mapping o Building threat data that could be harvest from fallen companies/recent attacks
  • Component mapping/identification o Importing of existing libraries o Have a standard library o Identify components from application scans
  • Inclusions of frameworks
  • Access control for threat modelling tool
  • Supports a universal data schema



  • Current Threat Modeling Tools
  • Next Generation Threat Modeling Tools requirements
  • Business Requirements

Back to list of all Outcomes

Edit this page here