OWASP Threat Dragon
⚙️OWASP Threat Dragon setup
If you didn't set up the
Access this link to interact with the application's web user interface.
threat-modelling
profile's infrastructure, please do so by running the command docker-compose --profile threat-modelling up
.Access this link to interact with the application's web user interface.
📚OWASP Threat Dragon documentation
The OWASP Threat Dragon documentation is available here.
Creating a threat model
- Access your local OWASP Threat Dragon user interface from the browser. If you have issues with the deployment of this container, please use the publicly available demo instance.
- Create a new, empty threat model.
- Fill in the details of the threat model.
- Create a new STRIDE diagram.
- Save the details of the threat model and start editing the STRIDE diagram.
- Use processes, stores, actors, and data flows from the left panel to model the behavior of Sand Castle. You can use the architectural diagram as a starting point.
- Use the specific elements from the left panel to draw the trust boundaries.
- For each component of the threat model, identify what actions an attacker can take to damage the security of Sand Castle.
- For each identified threat, create a new entry by selecting the affected component and using the bottom-left panel to enter its details.
🚧Solution
To display the solution of this task, enter the text i-surrender-to-the-code-security-gods
in the field below.