OWASP Threat Dragon
What is Threat Dragon?
OWASP Threat Dragon is a modeling tool used to create threat model diagrams as part of a secure development lifecycle. Threat Dragon follows the values and principles of the threat modeling manifesto. It can be used to record possible threats and decide on their mitigations, as well as giving a visual indication of the threat model components and threat surfaces. Threat Dragon runs either as a web application or a desktop application.
Threat Dragon supports STRIDE / LINDDUN / CIA, provides modelling diagrams and implements a rule engine to auto-generate threats and their mitigations.
Threat Dragon has a demonstration page. This is on older version which is due to be updated soon, and the notable difference is that we now have a desktop version that can be installed on linux - along with Windows and MacOS.
- OWASP PyTM (Pythonic Threat Modeling)
- OWASP Threat Model Cookbook
- Threat Modeling OWASP Cheat Sheet
- OWASP Threat Model Project
- OWASP Threat Model Project (old pages)
- Threagile - Agile Threat Modeling although it is not OWASP, it is open source
The Open Web Application Security Project (OWASP) is a nonprofit foundation that works to improve the security of software. All of our projects, tools, documents, forums, and chapters are free and open to anyone interested in improving application security.
Everyone is welcome and encouraged to participate in our Projects, Local Chapters, Events, Online Groups, and Community Slack Channel. We especially encourage diversity in all our initiatives. OWASP is a fantastic place to learn about application security, to network, and even to build your reputation as an expert. We also encourage you to be become a member or consider a donation to support our ongoing work.
Threat modelling is widely regarded as a powerful way to build security into the design of applications early in a secure development lifecycle. At its best, it is especially good for
- Ensuring defence-in-depth
- Establishing consistent security design patterns across an application
- Flushing out security requirements and user stories
OWASP Threat Dragon provides a free, open-source, threat modelling application for teams implementing the STRIDE approach. It can also be used for categorising threats using LINDDUN and CIA. The key areas of focus for the tool is:
- Great UX - using Threat Dragon should be simple, engaging and fun
- A powerful threat/mitigation rule engine - this lowers the barrier to entry for teams and allow non-specialists to contribute
- Integration points with other development lifecycle tools - when implemented this will ensure that models slot easily into the development lifecycle and remain relevant as the project evolves
Easy user experience is one of the key goals for the project and to get that right it needs more users! If you would like to try the tool out, the released versions are on the web application github.
The desktop variant has installers for Linux, Windows and MacOS which be downloaded from the desktop project github.
To help you get started, take a look at the documentaion area.
If you are still having problems, let us know and we will be pleased to help ([email protected] and [email protected]). All feedback is very welcome, so either email us or add an issue on the GitHub repo.
Coding help of any kind is always welcome. The project builds easily (let us know if you have any problems) so getting up and running should be simple. There are some developer notes in the core threat dragon repo to help get started with this project.
Threat rule engine
Mike Goodwin’s initial roadmap for the project is archived here. The original roadmap had various milestones, most of which were achieved by late 2020.
Milestone 1: Alpha release - Basic threat modelling experience
- achieved October 2015
Milestone 2: Beta release - Threat/mitigation rule engine
- achieved May 2017 with version 0.1.26
Milestone 3: Release 1.0
- production version released February 2020
- version 1.3.1 was released October 2020
Milestone 4: - Dev lifecycle integration
- Still to be completed, some CLI interface available mid 2020
Version 2.0: planned for late 2021
migrate to a combined application for both webapp and core
- run on node.js server
- use express for backend application
- use Vue for frontend application
- use mxgraph for the drawing library. Here is a good example for this
- provide a dockerfile for running in docker, similar to existing TD
- provide an API for CI/CD pipelines, see here for an example
- use test frameworks for unit (Mocha), component (Vue testing library) and end-to-end (nightwatch or puppeteer)
- set up ZAP to provide security testing on commit, similar to existing TD
- frontend logging using bunyan and optional logging to the console during development
- bundle the application and api for production using webpack
- be strictly open source, avoiding using languages or frameworks maintained outside the open source community
provide desktop application as a wrapper
- use electron to wrap webapp for desktop
- incorporates webapp as a git submodule, similar to drawio as a submodule for drawio-desktop
- provide auto-update similar to drawio-desktop
- provide a CLI for scripting based on TD’s existing use of yargs
- use test framework electron mocha
- electron log logging level controlled by command line
- be strictly open source
file access for both desktop and webbapp:
- load models from various sources similar to drawio:
- Google Drive
- local filesystem device
- design files are to be backwardly compatible to Threat Dragon json, along the lines of:
- read json file and convert to mxgraph native xml
- convert from mxgraph native xml and write as json file
- an online demonstration should be provided on threat dragon’s github pages
- demo should either be a snapshot or a release version, to be decided
|v2.0||Planned late 2021||Web app
|substantial rewrite for new drawing library mxgraph|
|v1.3.1||26 Oct 2020||Web app
|update documentation link to point to new docs page|
|v1.3||3 Sep 2020||Web app
|support for LINDDUN and CIA as well as STRIDE
and desktop command line interface
|v1.2||14 April 2020||Web app
|description for diagram elements
label applied to boundaries
save button always enabled
zoom functionality disabled
hot key copy and paste for diagram elements
|v1.1||15 Mar 2020||Web app||Duplicate element/diagram feature|
|v1.1||10 Mar 2020||Desktop||Bug fix for blank screen on new model,
and duplicate element/diagram feature
|v1.0||22 Feb 2020||Desktop||First full release for Windows, MacOS and Linux|
|v0.1.27-alpha||28 Jul 2019||Desktop||Windows only|
|v0.1.26||16 May 2017||Desktop||MacOS and Windows only|
|0.3.0||14 Mar 2017||Web app|
|v0.1.1-alpha||14 Mar 2016||Web app|