A threat model is ANY document that tries to answer the question “What could go wrong?” for a specific project.
This template helps create a threat model for your feature using the methodology demonstrated in this Threat Modeling Handbook. It is recommended to go through the handbook before using this template. however, below is a summary of how it works. You can also check a sample Threat model on Threat Model | File Upload Service (Sample)
This document helps go through Threat modeling in the 6 below steps:
Steps 1-4 should be performed during the “Design” phase of your project (Phase 1).
Step 5 should be performed during the “Testing” phase of your project (Phase 2).
Step 6 should be continuously running in the “Operate” phase of your project (Phase 3).
The goal is to identify the Risks, Threats, Mitigations, Verifications, and Tests.
Phase 1 is performed during “Design”, Phase 2 during “Test”, and Phase 3 during “Operate”