This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit

OWASP/Training/Threat Risk Modeling

Jump to: navigation, search
Threat Risk Modeling
Overview & Goal
When you start a web application design, it is essential to apply threat risk modeling; otherwise you will squander resources, time, and money on useless controls that fail to focus on the real risks.

The method used to assess risk is not nearly as important as actually performing a structured threat risk modeling. Microsoft notes that the single most important factor in their security improvement program was the corporate adoption of threat risk modeling.

Contents Materials
  • Performing threat risk modeling using the Microsoft Threat Modeling Process
  • Identify Security Objectives
  • Application Overview
  • Decompose Application
  • Identify Threats
  • Alternative Threat Modeling Systems


* OWASP Application Security Verification Standard Project (ASVS)