Skip to article frontmatterSkip to article content
Site not loading correctly?

This may be due to an incorrect BASE_URL configuration. See the MyST Documentation for reference.

STRIDE Threat Model

ThreatThreat Definition
SpoofingPretending to be something or someone other than oneself
TamperingUnauthorised modification of data on disk, in network transit, in memory, or in other locations
RepudiationDenying responsibility for an action or event (whether the claim is true or false)
Information DisclosureUnauthorised access to or exposure of sensitive or confidential information
Denial of ServiceMaking a service unavailable by exhausting or depleting required resources
Elevation of PrivilegeGaining higher access rights or permissions than originally authorised

Step 1: Define security requirements

  1. Define security requirements

  2. Create an application diagram

  3. Identify threats

  4. Mitigate threats

  5. Validate that threats have been mitigated

Step 2: Creating a Simple Design Representation

When applying STRIDE , create a simple representation of your design. Typically, this is done by creating a simple diagram.

  1. Data processes are represented with circles

  2. Data stores are represented with lines above and below their names (you may also see them as cylinders)

  3. Data flows are represented with directed lines; these include data flows over a network

  4. Interactors

  5. Trust boundaries are represented with a dashed line; these represent the border between trusted and untrusted portions.

Everything except the trust boundaries, processes, data stores, data flows, and interactors, are considered elements.

The idea is to have a simple model of the design that shows the essential features. Here are some quick rules of thumb for a good representation:

Step 3: Identify Threats Using STRIDE

When applying STRIDE examine each of the elements (processes, data stores, data flows, and interactors) to determine the threats to which it is susceptible. For each element, you look for the threats as shown in this table:

ThreatProperty ViolatedThreat Definition
SSpoofing IdentityAuthentication
TTampering with DataIntegrity
RRepudiationNon-repudiation
IInformation DisclosureConfidentiality
DDenial of ServiceAvailability
EElevation of PrivilegeAuthorization