What is Threat Modeling?
Threat modeling is the structured process of identifying potential security threats to a system, understanding their impact, and designing mitigations — performed at the design phase before implementation begins.
Every enterprise banking platform — from Core Banking to the Websites Portal — undergoes rigorous threat modeling before architecture is approved. It is the single most cost-effective security control in the SSDLC.
Why Threat Model Early?
- Design phase fix: ~$80 per vulnerability
- Development fix: ~$240 per vulnerability
- Production fix: ~$7,600+ per vulnerability
- Post-breach: $4.2M average incident cost (IBM 2024)
STRIDE Threat Categories
Developed by Microsoft, STRIDE is the most widely used threat categorisation framework. Each letter represents a threat category — applied to every element of the Data Flow Diagram to systematically enumerate threats.
Animated DFD Example
A Data Flow Diagram (DFD) maps all data movements in a system. Every crossing of a trust boundary (dashed line) is a potential threat surface requiring STRIDE analysis. Below is an interactive DFD for a typical banking API architecture.
DREAD Risk Scoring
DREAD scoring assigns a numerical risk level to each identified threat, enabling security teams to prioritise which threats to mitigate first. Each dimension is scored 1–10.
| DIMENSION | DESCRIPTION | SCORE 1 | SCORE 5 | SCORE 10 |
|---|---|---|---|---|
| Damage | Impact if successfully exploited | Minimal data exposure | Sensitive data leaked | Full system compromise |
| Reproducibility | How easy is it to reproduce? | Rarely succeeds | Sometimes succeeds | Always succeeds |
| Exploitability | Skill needed to exploit | Expert skill needed | Skilled attacker | Script kiddie |
| Affected Users | How many users impacted? | Single user | Some users | All users |
| Discoverability | How easy to discover? | Very difficult | Possible with research | Publicly known |
Attack Tree Methodology
Attack trees model the ways an attacker could achieve a goal in a tree structure. The root is the attacker's objective; branches are the paths to achieve it. This helps security architects visualise all possible attack vectors systematically.
Threat Modeling Toolchain
Threat Modeling at IT — Real-World Application
Every major project at IT Industry undergoes a formal threat modeling review before architecture sign-off. The process includes: DFD creation in Microsoft Threat Modeling Tool, STRIDE enumeration across all trust boundaries, DREAD scoring for prioritisation, and mitigation mapping to NIST CSF controls. Threat model artifacts are maintained in Confluence and revisited at each sprint review for high-risk components.