DREAD Threat Modeling Application

User Information

Executive Summary

This application facilitates threat modeling using the DREAD methodology (Damage Potential, Reproducibility, Exploitability, Affected Users, Discoverability). It enables security teams to identify assets, define threats, score them based on DREAD criteria, propose mitigations, and document findings. Results are stored in a dynamic threat table, importable and exportable to Excel, with an Action Log to track activities, ensuring a prioritized approach to managing security risks.

1. Preparation

Prepare the organization for a DREAD-based threat modeling process.

2. Asset Identification

Identify critical assets to be protected.

3. Threat Identification

Identify potential threats to the system.

4. DREAD Scoring

Score each threat using DREAD criteria.

5. Mitigation Planning

Define mitigations to address each threat.

Notify Stakeholders

DREAD Threat Modeling Form

Threat Table

Asset Threat Attack Vector Damage Potential Reproducibility Exploitability Affected Users Discoverability Mitigation Notes Action

Action Log

Please enter a name and activity description.