Renderowana dokumentacja
Ta strona renderuje Markdown i Mermaid modulu bezposrednio z publicznego zrodla dokumentacji.
Overview#
The Threat Model domain provides a threat modeling and security analysis visualization system. Users create named threat models containing typed nodes (web services, threat actors, hosts, databases, APIs, networks) and directed edges (attacks, exploits, communications, dependencies) to map security scenarios and identify vulnerabilities through graph-based analysis.
Key Features#
-
Graph-Based Threat Modeling - Build threat models as interactive graphs with typed nodes representing system components and directed edges representing relationships, attacks, and data flows.
-
Node Types - Model diverse system components including web services, threat actors, hosts, databases, APIs, and networks, each with category classification and custom properties.
-
Edge Types - Define relationships between nodes including attack paths, exploitation vectors, communication channels, dependencies, and containment relationships.
-
Visual Layout - Save and restore visualization layout configurations so team members can return to the same view and collaborate on threat model analysis.
-
Property Storage - Attach arbitrary metadata properties to both nodes and edges for flexible documentation of system characteristics, vulnerabilities, and mitigations.
-
Secrecy Level Controls - Apply classification levels to threat models to control access based on personnel clearance, ensuring sensitive security analysis is appropriately protected.
-
Organization Scoping - Threat models are scoped to their owning organization with access controls that ensure models are only visible to authorized personnel.
Use Cases#
-
Security Architecture Review - Map system architecture components, data flows, and trust boundaries to identify potential attack surfaces and security weaknesses.
-
Threat Identification - Model threat actors, their capabilities, and potential attack paths to understand the threats facing a system and prioritize defenses.
-
Vulnerability Analysis - Visualize how vulnerabilities in different system components could be exploited through attack chains to assess overall risk exposure.
-
Mitigation Planning - Document security controls and mitigations on the threat model graph to evaluate defensive coverage and identify gaps.
Integration#
The Threat Model domain supports security analysis across the platform:
- Vulnerability Management - Threat models reference known vulnerabilities
- Threat Actor Profiles - Known threat actors can be represented in models
- Investigation Management - Threat models support security investigation analysis
- Reporting - Threat model visualizations can be exported for documentation
Last Reviewed: 2026-02-24