Getting Started With ThreatModeler
ThreatModeler™ allows users to capture the entire flow of the application, and define certain properties based on which it automatically generates threats and classifies them under various risk categories. It’s simple to use navigation wizard help users to enter the required information they will need to get started with their application and build a threat profile of the application. ThreatModeler™ brings a mind mapping approach to threat modeling, allowing the user to decompose the application just like they do it on the white board but at the same time provide features that a white board cannot. User can define the communication channel (protocols) between different components; assign data elements and technical controls (like Form, URL, Cookie, Session, etc) to these components.
Once a user has completed the component diagram, ThreatModeler™ with its intelligent threat engine, (ThreatSense) automatically identifies threats based on the information provided and automatically prioritizes them based on risk.
This document will guide you through the steps on using ThreatModeler™ to create a threat model and analyze threats to your application. We have also provided help on every step of the way within the tool with information to guide you through each specific screen with a help button or you could browse through the entire help file by opening it from the menu.
The file is available for download below: