home / skills / bobmatnyc / claude-mpm-skills / threat-modeling
This skill helps you model threats for software systems by producing a data flow diagram, threat register, and mitigations turned into backlog tickets.
npx playbooks add skill bobmatnyc/claude-mpm-skills --skill threat-modelingReview the files below or copy the command above to add this skill to your agents.
---
name: threat-modeling
description: "Threat modeling workflow for software systems: scope, data flow diagrams, STRIDE analysis, risk scoring, and turning mitigations into backlog and tests"
version: 1.0.0
category: universal
author: Claude MPM Team
license: MIT
progressive_disclosure:
entry_point:
summary: "Run a lightweight threat modeling workshop (STRIDE) and turn risks into concrete mitigations, tests, and PR checks"
when_to_use: "When designing new features, reviewing architecture changes, handling sensitive data, or hardening auth/payment/multi-tenant flows"
quick_start: "1. Define scope/assets 2. Draw data flows + trust boundaries 3. STRIDE per element 4. Score + prioritize 5. Track mitigations + tests"
token_estimate:
entry: 150
full: 8000
context_limit: 900
tags:
- security
- threat-modeling
- stride
- architecture
- risk
requires_tools: []
---
# Threat Modeling (STRIDE)
## Outputs (Definition of Done)
Produce a data flow diagram, a threat register, and a mitigation plan that becomes tickets and tests.
## Load Next (References)
- `references/stride-workshop.md` — step-by-step workshop agenda + DFD guidance
- `references/common-threats-and-mitigations.md` — threat catalog with mitigations
- `references/templates.md` — copy/paste templates for docs and tickets
This skill provides a repeatable threat-modeling workflow for software systems, producing a data flow diagram, a prioritized threat register, and a mitigation plan that converts findings into backlog tickets and testable acceptance criteria. It integrates STRIDE analysis, risk scoring, and practical templates so teams can move from analysis to work items and verification quickly.
You define scope and assets, create a data flow diagram (DFD) to visualize components and trust boundaries, and run STRIDE analysis across DFD elements to enumerate threats. Each threat is scored for likelihood and impact, turned into a threat register, and mapped to concrete mitigations that become tickets and tests using provided templates and guidance.
What deliverables will I get from a session?
A DFD, a threat register with STRIDE findings and risk scores, and a mitigation plan split into backlog tickets and testable acceptance criteria.
How granular should the DFD be?
Model at the subsystem or feature level for focused sessions; expand detail only when a threat requires deeper analysis.