Threat Modeling Workflow
Threat modeling is about prioritization. You are choosing which failures would hurt most and reducing those first.
Workflow
- Define adversaries and realistic capabilities.
- Map assets: source docs, communications, accounts, devices.
- Map exposure points: network, endpoints, recipients, archives.
- Choose controls with highest risk-reduction per effort.
Control selection principle
Pick controls that are:
- repeatable under stress,
- easy to verify after execution,
- hard to accidentally bypass.
What this does not protect
- Unknown unknowns or zero-day compromise.
- Physical coercion or insider compromise.
- Legal compulsion risks.
Next safe steps
- Read
/security/technical/endpoint-and-browser-leakage-model. - Read
/security/policy.