Threat Dragon
About
Why is Threat Modeling Important?
Features of OWASP Threat Dragon
How OWASP Threat Dragon Works
Step 1: Define Scope and Components
Step 2: Create a Threat Model using Data Flow Diagrams (DFDs)
Step 3: Identify Security Threats
Step 4: Define Security Controls and Mitigation Strategies
Step 5: Review and Iterate
OWASP Threat Dragon vs Other Threat Modeling Tools
Feature
OWASP Threat Dragon
Microsoft Threat Modeling Tool
IriusRisk
Last updated