Build a Threat Model

Your custom applications are the crown jewels

Your custom applications are the crown jewels

In a world that demands pace of delivery and constant system evolution, development teams lack the time and resources to cover security as part of the software development lifecycle.

Insecure applications can create significant risks to

Unlike IT systems in your business, this makes applications particularly high risk if they are successfully attacked. Customer trust may be lost; revenue streams may cease; critical operations may malfunction or halt entirely; or sensitive customer data may make its way to the dark web, tarnishing the reputation of the business, possibly attracting negative publicity, regulatory scrutiny and fines or penalties.

The model at the centre

Models on the Threatplane platform (which resemble threat models used by security professionals while also going beyond what threat models provide) are the central ingredient required to secure your business. You can create an unlimited number of models on the platform (though more models may incur more cost, depending on your payment plan).

We recommend that each model you create maps to a system or process in your business. Most customers will benefit most by focussing modelling on where risk is most likely to arise in your business at first.

How It Works

The process used by the platform to build your model is based on a lean proven process our team have used in the field with countless customers. It is quick to execute, adept at capturing risks that matter and delivers excellent results.

The platform guides you through the process:

Scope definition

Scope capture is where the system is entered in diagrammatic form. You can easily import diagrams from the widely used Lucidchart or draw.io packages, or enter your own using the embedded diagramming capability which provides powerful and easy to use diagrams at the click of a button.

Threat modelling

Threat modelling uses threat intelligence, AI and other data sources to identify the threats your system faces, looking at multiple permutations of scenarios, control assumptions and attack vectors.

Risk assessment

Risk assessment follows the threat modelling by analysing what you’ve told us about your business and applying that knowledge to the model, giving you clear priorities for remediation.

Roadmap generation

Risk assessment follows the threat modelling by analysing what you’ve told us about your business and applying that knowledge to the model, giving you clear priorities for remediation.

Build your first model now and discover the areas of most risk

Security models are your way to build the full picture of a system’s security exposure and why it matters for your business.

Get building right away and uncover where critical assets or services could be susceptible to attack.