Resources Related to Threat Modeling: Designing for Security

cute graphic

This page contains some resources to help you threat model. If you're looking for a very quick intro, see "Threat Modeling: What, Why, and How?." There's also a set of threat modeling posts on Adam Shostack and Friends.

Getting Started

Adam has a few short essays that are designed to stand on their own as people get started. They include: Threat Modeling: What, Why, and How? for the MISTI Training Institute. You can also read Rolling Out a Threat Modeling Program there, and Security Engineering, the Who, What, Why and How at ISACA.

As your threat modeling journey continues, Shostack & Associates has a whitepaper, The Jenga View of Threat Modeling, which breaks out the building blocks of threat modeling in new ways.

Consulting and Training

Organizations that need to deliver more secure products or services are hiring Shostack and Associates to deliver training and help in threat modeling and secure development lifecycles (SDL). Onsite, hands-on training customized to your needs is an outstanding way to jump-start a program.

If you're interested please see "Threat Modeling Help From Shostack & Associates."

Adam will be delivering Applied Threat Modeling Training at Blackhat 2020 in Las Vegas. Last year these sold out quickly, so don't delay. There are 2 two day classes: Saturday/Sunday and Monday/Tuesday. Sign up for August 1-2 or August 3-4.

When planning training, we used to ask "are there lots of whiteboards?" Now, we ask "are the walls completely covered in whiteboards?" If not, we ship rolls of static cling whiteboards, and people always want to know how to get more.

Elevation of Privilege

The Elevation of Privilege (EoP) Threat Modeling Card Game is the easy way to get started threat modeling. The easiest way is to buy a copy from Agile Stationery (direct, or via Amazon). They've also created a lovely landing page with more information. You can also download the Creative Commons licensed files from Github or Microsoft. Elevation of Privilige is part of a growing movement of security games, and there are a growing number of derivative works, including:

There's also a BoardGameGeek description, and a number of videos showing how to play, including this one by Sunny Wear.


Threat Modeling Lessons from Star Wars

"Threat Modeling Lessons from Star Wars." This talk captures some of the ways in which threat modeling goes wrong, ranging from "think like an attacker" to what happens if you threat model when your system is being attacked by stub fighters. Previously, this site linked to the BruCon 0x06 version, which you can still find here.

The embed is not currently working, but click through works.

Learning Threat Modeling: For Security Professionals

Adam is doing training via Linkedin Learning.

The Intro course is available at Linkedin Learning, as are in depth courses on spoofing, tampering, and repudiation. Adam's instructor page is here.

Sample Chapters

Professor/Instructor Resources

Wiley maintains a instructor companion site for threat modeling including a one hour presentation, and a syllabus and presentations for a 13 week course, a set of quizzes, and other material to help you effectively teach threat modeling. You can also request online access for evaluation.


Errata last updated: June 25, 2018