OWASP Threat Modelling Guide
This initiative aims to compile and present a structured overview of various Threat Modelling methods, including concise descriptions, references to publicly available resources, and real-world case studies shared by practitioners. The main goals:
- Improves availability to different Threat Modelling techniques.
- Accelerate learning of Threat Modelling techniques.
- Support the process of choosing the most suitable method for the team.
Road Map
- Create an initial list of Threat Modelling methods.
- Add a brief description to each method.
- Find materials describing each method and real-world experiences with them.
- Reach out to industry professionals to collect case studies on the use of different Threat Modelling methods.
- Gather information about the conditions under which each method is most effective.
- Create a decision-making guide to help companies or teams select the most suitable Threat Modelling method.
Example
Put whatever you like here: news, screenshots, features, supporters, or remove this file and don’t use tabs at all.