
Threat Modeling Cheat Sheet ¶ Introduction ¶ Reduce risk in risk log for verified treated risk Test risk treatment to verify remediation Select appropriate controls to mitigate the risk Map Threat agents to application Entry pointsĭefine the Impact and Probability for each threatĪgree on risk mitigation with risk owners and stakeholders Highlight Authorization per user role over the DFD Manage to present your DFD in the context of MVCĭefine applications user roles and trust levels

Insecure Direct Object Reference PreventionĬonsider Data in transit and Data at rest
