2019-12-29 09:10:38 -05:00
2020-01-06 07:25:22 -05:00
# Awesome Threat Modeling [![Awesome](https://awesome.re/badge.svg)](https://awesome.re)
2019-12-29 09:10:38 -05:00
2020-01-07 03:01:54 -05:00
[<img src="images/awesome-threat-modelling.png"> ](https://www.practical-devsecops.com/devsecops-university/ )
2019-12-29 09:10:38 -05:00
2020-01-06 07:25:22 -05:00
A curated list of threat modeling resources (books, courses - free and paid, videos, tools, tutorials and workshop to practice on) for learning Threat modeling and initial phases of security review.
Contributions welcome. Add links through pull requests or create an issue to start a discussion.
## Contents
2019-12-29 09:10:38 -05:00
- [Books ](#books )
- [Courses ](#courses )
- [Videos ](#videos )
- [Tutorials and Blogs ](#tutorials-and-blogs )
2020-01-06 07:25:22 -05:00
- [Threat Model examples ](#threat-model-examples )
2019-12-29 09:10:38 -05:00
- [Tools ](#tools )
2020-01-06 07:25:22 -05:00
- [Sponsor ](#sponsor )
2019-12-29 09:10:38 -05:00
## Books
2020-01-06 07:25:22 -05:00
*Books on threat modeling.*
2019-12-29 09:10:38 -05:00
2020-01-06 07:25:22 -05:00
- [Threat Modeling: Designing for Security ](https://www.amazon.com/Threat-Modeling-Designing-Adam-Shostack/dp/1118809998 )
2019-12-29 09:10:38 -05:00
2020-01-06 07:25:22 -05:00
- [Threat Modeling ](https://www.amazon.in/Threat-Modeling-Microsoft-Professional-Swiderski/dp/0735619913 )
2019-12-29 09:10:38 -05:00
- [Risk Centric Threat Modeling: Process for Attack Simulation and Threat Analysis ](https://www.amazon.in/Risk-Centric-Threat-Modeling-Simulation/dp/0470500964 )
2020-01-06 07:25:22 -05:00
- [Threat Modeling ](https://www.oreilly.com/library/view/threat-modeling/9781492056546/ )
2019-12-29 09:10:38 -05:00
## Courses
2020-01-06 07:25:22 -05:00
*Courses/Training videos on threat modeling.*
2019-12-29 09:10:38 -05:00
### Free
2020-01-06 07:25:22 -05:00
- [Threat Modeling, or Architectural Risk Analysis by Coursera ](https://www.coursera.org/lecture/software-security/threat-modeling-or-architectural-risk-analysis-bQAoU )
2019-12-29 09:10:38 -05:00
2020-01-06 07:25:22 -05:00
- [Threat Modeling Workshop by Robert Hurlbut ](https://github.com/rhurlbut/CodeMash2019/blob/master/Robert-Hurlbut-CodeMash2019-Threat-Modeling-Workshop-20190108.pdf )
2019-12-29 09:10:38 -05:00
### Paid
2020-01-06 07:25:22 -05:00
- [DevSecOps Expert by Practical DevSecOps ](https://www.practical-devsecops.com/certified-devsecops-expert/ )
2019-12-29 09:10:38 -05:00
2020-01-06 07:25:22 -05:00
- [Threat Modeling Fundamentals ](https://www.pluralsight.com/courses/threat-modeling-fundamentals )
2019-12-29 09:10:38 -05:00
2020-01-06 07:25:22 -05:00
- [CyberSec First Responder: Threat Detection & Response CFR210 ](https://www.udemy.com/course/cybersec-first-responder-threat-detection-response-cfr210/ )
2019-12-29 09:10:38 -05:00
2020-01-06 07:25:22 -05:00
- [Learning Threat Modeling for Security Professionals ](https://www.lynda.com/Web-Development-tutorials/Learning-Threat-Modeling-Security-Professionals/769294-2.html )
2019-12-29 09:10:38 -05:00
2020-01-06 07:25:22 -05:00
- [Threat Modeling: Spoofing In Depth ](https://www.lynda.com/IT-tutorials/Threat-Modeling-Spoofing-Depth/769300-2.html?srchtrk=index%3a7%0alinktypeid%3a2%0aq%3athreat+modelling%0apage%3a1%0as%3arelevance%0asa%3atrue%0aproducttypeid%3a2 )
2019-12-29 09:10:38 -05:00
2020-01-06 07:25:22 -05:00
- [Threat Modeling: Tampering in Depth ](https://www.lynda.com/IT-tutorials/Threat-Modeling-Tampering-Depth/2810167-2.html?srchtrk=index%3a1%0alinktypeid%3a2%0aq%3athreat+modelling%0apage%3a1%0as%3arelevance%0asa%3atrue%0aproducttypeid%3a2 )
2019-12-29 09:10:38 -05:00
2020-01-06 07:25:22 -05:00
- [Threat Modeling or Whiteboard Hacking training ](https://www.toreon.com/threatmodeling/ )
2019-12-29 09:10:38 -05:00
## Videos
2020-01-06 07:25:22 -05:00
*Videos talking about Threat modeling.*
2019-12-29 09:10:38 -05:00
2020-01-06 07:25:22 -05:00
- [Introduction, Threat Models ](https://www.youtube.com/watch?v=GqmQg-cszw4 )
2019-12-29 09:10:38 -05:00
2020-01-06 07:25:22 -05:00
- [Creating a Threat Model using TMT 2016 ](https://www.youtube.com/watch?v=-VokDIHS5XM )
2019-12-29 09:10:38 -05:00
2020-01-06 07:25:22 -05:00
- [Using Threat Modeling ](https://www.youtube.com/watch?v=n8ozucTo810 )
2019-12-29 09:10:38 -05:00
2020-01-06 07:25:22 -05:00
- [Threat Modeling in 2019 ](https://www.youtube.com/watch?v=ZoxHIpzaZ6U )
2019-12-29 09:10:38 -05:00
2020-01-06 07:25:22 -05:00
- [Threat Modeling Toolkit ](https://www.youtube.com/watch?v=KGy_KCRUGd4 )
2019-12-29 09:10:38 -05:00
2020-01-06 07:25:22 -05:00
- [Adaptive Threat Modelling ](https://www.youtube.com/watch?v=YTtO_TGV2fU )
2019-12-29 09:10:38 -05:00
2020-01-06 07:25:22 -05:00
- [Threat modeling ](https://www.youtube.com/watch?v=v8aYNcE1QlI )
2019-12-29 09:10:38 -05:00
2020-01-06 07:25:22 -05:00
- [Threat Model Every Story: Practical Continuous Threat Modeling Work for Your Team ](https://www.youtube.com/watch?v=VbW-X0j35gw )
2019-12-29 09:10:38 -05:00
2020-01-06 07:25:22 -05:00
- [Threat Modeling for Secure Software Design ](https://www.youtube.com/watch?v=OH2LqzDk2Zg )
2019-12-29 09:10:38 -05:00
2020-01-06 07:25:22 -05:00
- [Fixing Threat Models with OWASP Efforts ](https://www.youtube.com/watch?v=-dQcg0FDLpk )
2019-12-29 09:10:38 -05:00
2020-01-06 07:25:22 -05:00
- [Designing for Security through Threat Modelling ](https://www.youtube.com/watch?v=6fhEdJ9YcU0 )
2019-12-29 09:10:38 -05:00
2020-01-06 07:25:22 -05:00
- [Unlocking Threat Modeling ](https://www.youtube.com/watch?v=J_ksjjUz73s )
2019-12-29 09:10:38 -05:00
2020-01-06 07:25:22 -05:00
- [An Agile Approach to Threat Modeling for Securing Open Source Project EdgeX Foundry ](https://www.youtube.com/watch?v=iw-FzeKaj48 )
2019-12-29 09:10:38 -05:00
## Tutorials and Blogs
2020-01-06 07:25:22 -05:00
*Tutorials and blogs that explain threat modeling*
- [Threat Modeling: What, Why, and How? ](https://misti.com/infosec-insider/threat-modeling-what-why-and-how )
- [Threat Modeling: 12 Available Methods ](https://insights.sei.cmu.edu/sei_blog/2018/12/threat-modeling-12-available-methods.html )
- [What Is Security Threat Modeling? ](https://www.dummies.com/programming/certification/security-threat-modeling/ )
2019-12-29 09:10:38 -05:00
2020-01-06 07:25:22 -05:00
- [Threat-modeling CheatSheet By Owasp ](https://cheatsheetseries.owasp.org/cheatsheets/Threat_Modeling_Cheat_Sheet.html )
2019-12-29 09:10:38 -05:00
2020-01-06 07:25:22 -05:00
- [Threat Modeling in the Enterprise ](https://securityintelligence.com/threat-modeling-in-the-enterprise-part-1-understanding-the-basics/ )
2019-12-29 09:10:38 -05:00
2020-01-06 07:25:22 -05:00
- [Approachable threat modeling ](https://increment.com/security/approachable-threat-modeling/ )
2019-12-29 09:10:38 -05:00
2020-01-06 07:25:22 -05:00
- [Threat Modeling for Dummies ](https://www.slideshare.net/AdamEnglander/threat-modeling-for-dummies-cascadia-php-2018 )
2019-12-29 09:10:38 -05:00
2020-01-06 07:25:22 -05:00
- [DevSecOps, Threat Modeling and You: Get started using the STRIDE method ](https://medium.com/@brunoamaroalmeida/devsecops-threat-modelling-and-you-get-started-using-the-stride-method-85d143ab86f4 )
2019-12-29 09:10:38 -05:00
2020-01-06 07:25:22 -05:00
- [Threat Modeling: The Why, How, When and Which Tools ](https://devops.com/threat-modeling-the-why-how-when-and-which-tools/ )
2019-12-29 09:10:38 -05:00
2020-01-06 07:25:22 -05:00
- [Threat-modeling datasheet ](https://www.synopsys.com/content/dam/synopsys/sig-assets/datasheets/threat-modeling-datasheet.pdf )
2019-12-29 09:10:38 -05:00
2020-01-06 07:25:22 -05:00
- [Threat Modeling blog ](https://blog.securityinnovation.com/topic/threat-modeling )
2019-12-29 09:10:38 -05:00
2020-01-06 07:25:22 -05:00
- [Threat Modeling: 6 Mistakes You are Probably Making ](https://www.varonis.com/blog/threat-modeling/ )
2019-12-29 09:10:38 -05:00
2020-01-06 07:25:22 -05:00
- [How to Create a Threat Model for Cloud Infrastructure Security ](https://www.threatstack.com/blog/how-to-create-a-threat-model-for-cloud-infrastructure-security )
2019-12-29 09:10:38 -05:00
2020-01-06 07:25:22 -05:00
- [Why You Should Care About Threat Modelling ](https://community.arm.com/developer/ip-products/security/b/security-ip-blog/posts/why-you-should-care-about-threat-modelling )
2019-12-29 09:10:38 -05:00
2020-01-06 07:25:22 -05:00
- [Benefits of Threat Modeling ](https://nvisium.com/blog/2019/05/30/benefits-of-threat-modeling.html )
2019-12-29 09:10:38 -05:00
2020-01-06 07:25:22 -05:00
- [Threat Modeling: a Summary of Available Methods Whitepaper ](https://resources.sei.cmu.edu/asset_files/WhitePaper/2018_019_001_524597.pdf )
2019-12-29 09:10:38 -05:00
2020-01-06 07:25:22 -05:00
- [Threat Modelling Toolkit ](https://www.owasp.org/images/0/00/Threat_Modelling_-_STRIDE_Cards_-_TW_Branded.pdf )
2019-12-29 09:10:38 -05:00
2020-01-06 07:25:22 -05:00
- [How to get started with Threat Modeling, before you get hacked ](https://hackernoon.com/how-to-get-started-with-threat-modeling-before-you-get-hacked-1bf0ea3310df )
2019-12-29 09:10:38 -05:00
2020-01-06 07:25:22 -05:00
- [Thread Modeling tutorial ](https://www.geeksforgeeks.org/threat-modelling/ )
2019-12-29 09:10:38 -05:00
2020-01-06 07:25:22 -05:00
- [How to analyze the security of your application with threat modeling ](https://www.freecodecamp.org/news/threat-modeling-goran-aviani/ )
2019-12-29 09:10:38 -05:00
2020-01-06 07:25:22 -05:00
- [Tactical Threat Modeling ](https://safecode.org/wp-content/uploads/2017/05/SAFECode_TM_Whitepaper.pdf )
2019-12-29 09:10:38 -05:00
2020-01-06 07:25:22 -05:00
- [The Power of a Tailored Threat Model Whitepaper ](https://www.lookingglasscyber.com/resources/white-papers/the-power-of-a-tailored-threat-model/ )
2019-12-29 09:10:38 -05:00
2020-01-06 07:25:22 -05:00
- [7 Easy Steps For Building a Scalable Threat Modeling Process ](https://go.threatmodeler.com/7-steps-building-scalable-threat-modeling-process )
2019-12-29 09:10:38 -05:00
2020-01-06 07:25:22 -05:00
- [Where is my Threat Model? ](https://blog.appsecco.com/where-is-my-threat-model-b6f8b077ac47 )
2019-12-29 09:10:38 -05:00
2020-01-06 07:25:22 -05:00
## Threat Model examples
*Threat model examples for reference.*
- [SSL Threat model by Qualys ](https://www.ssllabs.com/downloads/SSL_Threat_Model.png )
- [DNS Security: Threat Modeling DNSSEC, DoT, and DoH by Jan Schuamann ](https://www.netmeister.org/blog/doh-dot-dnssec.html )
- [Email Encryption Gateway Threat model by NCC Group ](https://www.slideshare.net/NCC_Group/real-world-application-threat-modelling-by-example )
2019-12-29 09:10:38 -05:00
## Tools
2020-01-06 07:25:22 -05:00
*Tools which helps in threat modelling.*
2019-12-29 09:10:38 -05:00
### Free tools
2020-01-06 07:25:22 -05:00
- [OWASP Threat Dragon ](https://www.owasp.org/index.php/OWASP_Threat_Dragon ) - An online threat modelling web application including system diagramming and a rule engine to auto-generate threats/mitigations.
2019-12-29 09:10:38 -05:00
2020-01-06 07:25:22 -05:00
- [Microsoft Threat Modeling Tool ](https://docs.microsoft.com/en-gb/azure/security/develop/threat-modeling-tool ) - Microsoft Threat Modeling Tool 2016 is a tool that helps in finding threats in the design phase of software projects.
2019-12-29 09:10:38 -05:00
2020-01-06 07:25:22 -05:00
- [Owasp-threat-dragon-gitlab ](https://github.com/appsecco/owasp-threat-dragon-gitlab ) - This project is a fork of the original OWASP Threat Dragon web application by Mike Goodwin with Gitlab integration instead of GitHub. You can use it with the Gitlab.com or your own instance of Gitlab.
2019-12-29 09:10:38 -05:00
2020-01-06 07:25:22 -05:00
- [Raindance ](https://github.com/devsecops/raindance ) - Project intended to make Attack Maps part of software development by reducing the time it takes to complete them.
2019-12-29 09:10:38 -05:00
2020-01-06 07:25:22 -05:00
- [Threatspec ](https://threatspec.org/ ) - Threatspec is an open source project that aims to close the gap between development and security by bringing the threat modelling process further into the development process.
2019-12-29 09:10:38 -05:00
### Paid tools
2020-01-06 07:25:22 -05:00
- [Irius risk ](https://iriusrisk.com/threat-modeling-tool/ ) - Iriusrisk is a threat modeling tool with an adaptive questionnaire driven by an expert system which guides the user through straight forward questions about the technical architecture, the planned features and security context of the application.
2019-12-29 09:10:38 -05:00
2020-01-06 07:25:22 -05:00
- [SD elements ](https://www.securitycompass.com/sdelements/threat-modeling/ ) - Automate Threat Modeling with SD Elements.
2019-12-29 09:10:38 -05:00
2020-01-06 07:25:22 -05:00
- [Foreseeti ](https://www.foreseeti.com/ ) - SecuriCAD Vanguard is an attack simulation and automated threat modeling SaaS service that enables you to automatically simulate attacks on a virtual model of your AWS environment.
2019-12-29 09:10:38 -05:00
2020-01-06 07:25:22 -05:00
## Sponsor
2019-12-29 09:10:38 -05:00
2020-01-06 07:25:22 -05:00
![Practical DevSecOps ](images/practical-devsecops-logo.png )
2019-12-29 09:10:38 -05:00
## Contributing
2020-01-06 07:25:22 -05:00
Please refer the guidelines at [contributing.md for details ](contributing.md ).
2019-12-29 09:10:38 -05:00