16.14
IG3

Conduct Threat Modeling

Asset Type: Applications
Security Function: Protect

Description

Conduct threat modeling. Threat modeling is the process of identifying and addressing application security design flaws within a design, before code is created. It is conducted through specially trained individuals who evaluate the application design and gauge security risks for each entry point and access level. The goal is to map out the application, architecture, and infrastructure in a structured way to understand its weaknesses.

Implementation Checklist

1
Assess current protection controls in place
2
Configure and deploy required security controls
3
Test control effectiveness in non-production environment
4
Deploy to production and verify functionality
5
Document configuration and operational procedures
6
Develop or procure training content
7
Define training audience and completion requirements
8
Deploy training and track completion rates
9
Measure training effectiveness through testing/simulation
10
Draft policy/procedure document
11
Obtain stakeholder review and approval
12
Communicate to affected personnel
13
Schedule periodic review and updates

Threats & Vulnerabilities (CIS RAM)

Threat Scenarios

Architectural Design Flaw Exploited After Deployment

Confidentiality

An attacker exploits a fundamental design flaw in the application architecture, such as an insecure trust boundary, that would have been identified during threat modeling but was never analyzed before code was written.

Unidentified Entry Points Leveraged by Attacker

Integrity

An attacker discovers and exploits an overlooked entry point in the application that the development team did not consider because no structured threat modeling mapped all attack surfaces and access levels.

Costly Post-Deployment Redesign for Security Flaw

Availability

A fundamental security weakness is discovered in production that requires a complete architectural redesign, which would have been trivial to fix during design had threat modeling identified it before development began.

Vulnerabilities (When Safeguard Absent)

No Pre-Development Threat Analysis

Without threat modeling before code is written, architectural security weaknesses, insecure trust boundaries, and unprotected entry points are embedded in the design and are costly to remediate later.

Attack Surface Not Systematically Mapped

Absence of threat modeling means the application's entry points, data flows, trust boundaries, and access levels are not formally analyzed for security risks, leaving blind spots in the security posture.

Evidence Requirements

Type Evidence Item Collection Frequency
Technical Configuration screenshots or exports showing protection controls enabled Captured quarterly
Document Procedure documentation for protection measures Reviewed annually
Record Training completion records and compliance rates Tracked continuously, reported quarterly
Document Training content and curriculum documentation Reviewed annually
Document Governing policy document (current, approved, communicated) Reviewed annually