Resources Related to Threat Modeling: Designing for Security

cute graphic

This page contains some resources to help you threat model. If you're looking for a very quick intro, see "Threat Modeling: What, Why, and How?." There's also a set of threat modeling posts on Adam Shostack and Friends.

Getting Started

Adam has a few short essays that are designed to stand on their own as people get started. They include: Threat Modeling: What, Why, and How? for the MISTI Training Institute. You can also read Rolling Out a Threat Modeling Program there, and Security Engineering, the Who, What, Why and How at ISACA.

Consulting and Training

Organizations that need to deliver more secure products or services are hiring Shostack and Associates to deliver training and help in threat modeling and secure development lifecycles (SDL). Onsite, hands-on training customized to your needs is an outstanding way to jump-start a program.

If you're interested please see "Threat Modeling Help From Shostack & Associates."

When planning training, we used to ask "are there lots of whiteboards?" Now, we ask "are the walls completely covered in whiteboards?" If not, we ship rolls of static cling whiteboards, and people always want to know how to get more.

Elevation of Privilege

The Elevation of Privilege (EoP) Threat Modeling Card Game is the easy way to get started threat modeling. You can download the Creative Commons licensed files from Microsoft (including PDF, instructions, score card, and more!), or from Github. You can buy a copy via Agile Stationery, GameCrafter or sometimes via ebay.
There are a growing number of derivative works, including:

There's also a BoardGameGeek description, and Elevation of Privilige is part of a growing movement of security games.


Threat Modeling Lessons from Star Wars
This is the keynote video from BruCon 0x06, which came together particularly well. It's titled "Threat Modeling Lessons from Star Wars." This talk captures some of the ways in which threat modeling goes wrong, ranging from "think like an attacker" to what happens if you threat model when your system is being attacked by stub fighters. (The talk runs 48 minutes with an additional 15 minutes of Q+A).

Learning Threat Modeling: For Security Professionals

Adam is doing training via Linkedin Learning. The Intro course is available at Linkedin Learning.

Sample Chapters

Professor/Instructor Resources

Wiley maintains a instructor companion site for threat modeling including a one hour presentation, and a syllabus and presentations for a 13 week course, a set of quizzes, and other material to help you effectively teach threat modeling. You can also request online access for evaluation.


Errata last updated: June 25, 2018