Threat Modeling: The Complete Guide for Security and Compliance Teams
2026-03-08
By Emre Salmanoglu

Threat Modeling: The Complete Guide for Security and Compliance Teams

Learn how to implement threat modeling that satisfies ISO 27001, SOC 2, NIS2, and DORA. Covers STRIDE, PASTA, attack trees, data flow diagrams, risk assessment, and compliance evidence.

threat modeling
STRIDE
risk assessment
secure design
compliance

What Is Threat Modeling?

Threat modeling is a structured methodology for identifying and mitigating security threats during the design and architecture phase of system development. Rather than waiting to find vulnerabilities through testing, threat modeling proactively analyses how a system could be attacked and builds defences into the design.

Effective threat modeling answers four key questions: What are we building? What can go wrong? What are we going to do about it? Did we do a good enough job?

Threat Modeling Methodologies

MethodologyApproachBest ForComplexity
STRIDEThreat classification (6 categories)Development teams, component analysisLow-Medium
PASTARisk-centric, 7-stage processEnterprise risk assessmentHigh
Attack treesTree structure mapping attack pathsSpecific threat scenariosMedium
LINDDUNPrivacy-focused threat categoriesPrivacy-sensitive applicationsMedium
VASTVisual, agile, scalable threat modelingLarge organisations, DevOpsMedium
Kill chain analysisAdversary behaviour modellingIncident response preparationMedium

STRIDE Threat Categories

CategoryThreatSecurity PropertyCountermeasure
SpoofingPretending to be another user or systemAuthenticationStrong authentication, MFA, certificates
TamperingModifying data, code, or configurationsIntegrityInput validation, checksums, digital signatures
RepudiationDenying actions were takenNon-repudiationAudit logging, digital signatures, timestamps
Information disclosureExposing data to unauthorised partiesConfidentialityEncryption, access controls, data masking
Denial of servicePreventing legitimate access to resourcesAvailabilityRate limiting, redundancy, auto-scaling
Elevation of privilegeGaining unauthorised access levelsAuthorisationLeast privilege, RBAC, input validation

Threat Modeling Process

StepActivitiesOutput
1. ScopeDefine system boundaries, assets, and trust levelsSystem context diagram
2. DecomposeCreate data flow diagrams showing components, data flows, trust boundariesDFD with trust boundaries
3. Identify threatsApply STRIDE or chosen methodology to each elementThreat list with descriptions
4. Assess riskRate each threat by likelihood and impactPrioritised threat matrix
5. Determine countermeasuresIdentify security controls for each threatCountermeasure mapping
6. ValidateVerify countermeasures are effective and implementedValidation report
7. DocumentRecord model, decisions, and residual risksThreat model document

Data Flow Diagram Elements

ElementSymbolExamplesThreat Focus
External entityRectangleUsers, external APIs, third-party systemsSpoofing, input validation
ProcessCircleApplication logic, microservicesAll STRIDE categories
Data storeParallel linesDatabases, file systems, cachesTampering, information disclosure
Data flowArrowAPI calls, network connections, file transfersTampering, information disclosure
Trust boundaryDashed lineNetwork perimeter, service mesh, authenticationAll categories (highest risk area)

Risk Assessment Matrix

Low ImpactMedium ImpactHigh ImpactCritical Impact
High LikelihoodMediumHighCriticalCritical
Medium LikelihoodLowMediumHighCritical
Low LikelihoodInformationalLowMediumHigh

Common Threat Patterns

PatternDescriptionWhere FoundCountermeasure
Broken authenticationWeak or bypassed authenticationLogin flows, API endpointsMFA, session management, token validation
InjectionUntrusted input executed as codeDatabase queries, OS commands, LDAPInput validation, parameterised queries
Data exposureSensitive data transmitted or stored insecurelyAPIs, databases, logsEncryption, masking, access controls
Privilege escalationUser gains higher access than authorisedAdmin functions, role assignmentsLeast privilege, authorisation checks
Supply chain compromiseMalicious third-party componentsDependencies, integrations, APIsSCA, SBOM, vendor assessment
Insider threatAuthorised user acts maliciouslyAll internal systemsMonitoring, separation of duties, access reviews

Compliance Requirements

Framework Mapping

RequirementISO 27001SOC 2NIS2DORA
Risk assessmentA.5.7CC3.2Art. 21(2)(a)Art. 8(1)
Threat intelligenceA.5.7CC3.2Art. 21(2)(a)Art. 8(6)
Secure designA.8.25CC8.1Art. 21(2)(e)Art. 8(1)
Security requirementsA.8.26CC8.1Art. 21(2)(e)Art. 8(1)
Security testingA.8.29CC8.1Art. 21(2)(e)Art. 8(3)
Change risk assessmentA.8.32CC8.1Art. 21(2)(e)Art. 8(2)

Audit Evidence

Evidence TypeDescriptionFramework
Threat model documentsCompleted threat models for critical systemsAll frameworks
Data flow diagramsCurrent DFDs showing trust boundariesISO 27001, SOC 2
Risk assessment resultsPrioritised threat lists with ratingsAll frameworks
Countermeasure mappingThreats mapped to implemented controlsAll frameworks
Threat model review recordsEvidence of periodic review and updatesISO 27001, NIS2
Remediation trackingTickets showing threat-to-fix workflowAll frameworks
Training recordsDeveloper threat modeling trainingISO 27001, SOC 2

Common Mistakes

MistakeRiskFix
Only modelling at initial designDrift between model and realityUpdate threat models on significant changes
Too abstract, no actionable outputModels provide no security valueInclude specific, testable countermeasures
Only security team participatesMissing domain knowledgeInclude developers, architects, and product owners
Ignoring trust boundariesMissing the highest-risk attack surfacesMap every trust boundary crossing in DFDs
No threat prioritisationTreating all threats equallyUse risk assessment to focus on critical threats first
Not tracking remediationIdentified threats never addressedTrack countermeasures as security requirements

How Orbiq Supports Threat Modeling Compliance

Orbiq helps you demonstrate threat modeling and risk assessment:

  • Evidence collection — Centralise threat models, risk assessments, and remediation records
  • Continuous monitoring — Track threat model coverage and remediation progress
  • Trust Center — Share your secure design practices via your Trust Center
  • Compliance mapping — Map threat modeling activities to ISO 27001, SOC 2, NIS2, and DORA
  • Audit readiness — Pre-built evidence packages for auditor review

Further Reading