
- Cons of microsoft free sdl threat modeling tool how to#
- Cons of microsoft free sdl threat modeling tool software#
Step 3 “Describe Environment” – Allows a user to track project information, such as dependencies
Cons of microsoft free sdl threat modeling tool how to#
Step 2 “Analyze Model” – The center for analysis of the model, where users use Spoofing, Tampering, Repudiation, Information Disclosure, Denial of Service and Elevation of Privilege ( STRIDE) to find each threat and figure out how to mitigate it
Cons of microsoft free sdl threat modeling tool software#
Step 1 “Draw Diagram” – This screen is used to draw a data flow diagram of the software The SDL Threat Modeling Tool contains four main screens that walk users through the threat modeling process: This tool builds on activities that all software developers and architects are familiar with–such as drawing pictures for their software architecture.


This article in our series focused on Microsoft’s free security tools is on the Security Development Lifecycle (SDL) Threat Modeling Tool.įor a quick backgrounder on threat modeling, let me recommend an article that my colleague, Michael Howard, recently published on threat modeling.
