Overview
Syllabus
Intro
Threat Models as Code?
Benefits of Code
Drawbacks of Code
Threagile - Agile Threat Modeling Toolkit
First Steps with Threagile Create either a minimal stub model or a filed example model
Example Model: Data Assets
Example Model: Communication Links
Example Model: Trust Boundaries
Execute a Threagile Run Processes the YAML model file
Model Graph Generation (Data Flows)
PDF & Excel Report Generation
STRIDE Classification of Risks
Assignment by Function
Relative Attacker Attractiveness (RAA)
Data Breach Probabilities (DBP)
Risk Mitigation Recommendations
Risk Instances by vulnerability & by tech as
Detail Results as JSON
Risk Rules -40 and constantly growing
Custom Risk Rules (plugin interface)
Editing Support in IDES Schema for YAML input available Enables syntax validation error flagging & auto-completion
Risk Tracking inside YAML file by Risk-1
What About Bigger Models?
Model Macros: Interactive Wizards Interactive wizards reading existing models and modify/enhance them
GitHub Integration (as workflow action)
Possible Effects
Upcoming Features currently in developme
Taught by
OWASP Foundation