SAMMY works best on screens 1024px wide or larger.
Maturity Level 1
Maturity Level 2
Maturity Level 3
Perform basic threat modeling
D-TA-B-1: Do you identify and manage architectural design flaws with threat modeling?
  • You perform threat modeling for high-risk applications
  • You use simple threat checklists, such as STRIDE
  • You persist the outcome of a threat model for later use
Description

Threat modeling is a structured activity for identifying, evaluating, and managing system threats, architectural design flaws, and recommended security mitigations. It is typically done as part of the design phase or as part of a security assessment.

Threat modeling is a team exercise, including product owners, architects, security champions, and security testers. At this maturity level, expose teams and stakeholders to threat modeling to increase security awareness and to create a shared vision on the security of the system.

At maturity level 1, you perform threat modeling ad-hoc for high-risk applications and use simple threat checklists, such as STRIDE. Avoid lengthy workshops and overly detailed lists of low-relevant threats. Perform threat modeling iteratively to align to more iterative development paradigms. If you add new functionality to an existing application, look only into the newly added functions instead of trying to cover the entire scope. A good starting point is the existing diagrams that you annotate during discussion workshops. Always make sure to persist the outcome of a threat modeling discussion for later use.

Your most important tool to start threat modeling is a whiteboard, smartboard, or a piece of paper. Aim for security awareness, a simple process, and actionable outcomes that you agree upon with your team.

OWASP Team guidance

This guidance is curated by the OWASP SAMM team to help you implement this activity.

Community guidance

This guidance is contributed by the community to help you implement this activity.