5 of the Best Threat Modeling Methodologies for Cloud Systems

In today's digital age, the need for security for systems and applications has never been greater. With the increasing sophistication of cyber attacks, organisations must proactively protect their sensitive data, systems, and applications. A single security breach can result in significant financial losses, reputational damage, and legal liabilities. Therefore, organisations must implement robust security measures to safeguard their assets.

One approach to strengthening security measures is to use threat modelling. It is a structured approach to analysing systems and identifying potential threats and vulnerabilities. It helps security professionals to develop a comprehensive understanding of the system, its components, and how they interact. By identifying potential threats and vulnerabilities, security professionals can develop strategies to reduce risk and improve the overall security posture of a system. Threat modelling methodologies work to identify potential threats and vulnerabilities by considering various factors such as the system architecture, the data flow, the access control mechanisms, and the potential attack vectors.

However, all threat modelling methodologies are unique in their own ways, giving companies various options. With this in mind, here are some of the best methodologies for threat modelling:

1. Attack Trees

Attack trees are a technique used to identify potential threats and their routes through a visual diagram that resembles a tree. The tree's root represents the attack's goal, while the leaves represent the methods or routes to the attack. This model provides a set of attack trees with a separate attack goal. Although initially used as a stand-alone method, it is now commonly combined with frameworks such as STRIDE, PASTA, and CVSS.

It breaks down a complex attack into smaller, more manageable components. Each component represents a possible attack vector, and the tree's branching structure shows how each component can be combined to achieve the ultimate goal. Attack trees can be useful for identifying potential vulnerabilities and prioritising them based on their impact and likelihood.

2. Common Vulnerability Scoring System

The CVSS is a widely used technique for assessing security weaknesses. It was created by the National Institute of Standards and Technology and helps to determine the severity of known vulnerabilities and any existing countermeasures. This methodology is helpful for security experts to use threat intelligence effectively and efficiently. The system rates each vulnerability on a scale of 10 based on its severity.

Additionally, the CVSS is an excellent way to communicate the severity of a vulnerability to stakeholders who may not be technical experts. This allows for a clear and concise understanding of the potential impact of a vulnerability and the need for action to mitigate it. The scoring system considers various factors such as ease of attack, exploitability, and potential impact on confidentiality, integrity, and availability of the system. Using the CVSS, security professionals can prioritise vulnerabilities and allocate resources accordingly to address the most critical issues.


PASTA is a threat modelling methodology that prioritises high-risk threats and focuses on seven steps to assess and address them. By giving more attention to vulnerabilities that pose a greater risk, PASTA ensures that resources are allocated more effectively. Additionally, PASTA emphasises the importance of considering business context, differentiating it from other methodologies like STRIDE.

For example, if a software system is used for financial transactions, PASTA would consider the potential impact of a threat like unauthorised access to financial data much higher than a threat like denial of service attacks. PASTA also encourages collaboration between various stakeholders, such as developers, testers, and business analysts, to ensure that all aspects of the system are considered during the threat modelling process.


The STRIDE acronym stands for Spoofing identity, Tampering with data, Repudiation, Information disclosure, Denial of service, and Elevation of privilege, representing the common threat classes a system typically faces. STRIDE is a threat modelling method developed by Microsoft that has become one of the most successful methods available. It uses data flow diagrams to identify system boundaries, events, and entities. Unlike the rest of the other methodologies on this list, STRIDE is a more generic approach that does not prioritise specific threats or consider the business context. Instead, it identifies and categorises potential threats based on their characteristics.

5. Trike

Trike is a security assessment technique that utilises a risk-based approach to identify potential threats. It assigns a risk score to each asset and ensures that the level of risk is acceptable to stakeholders. The risk values are rated on a five-point probability scale. It uses a step matrix with actors and assets to create a four-part matrix that covers create, read, update, and delete. Trike is a distinctive threat modelling methodology that focuses on risk management and defence, which is indispensable for organisations prioritising their security efforts based on their business context.


Threat modelling is a crucial aspect of cybersecurity as it helps organisations identify and mitigate potential vulnerabilities before an attack occurs. For this reason, various methodologies have been developed to help organisations assess their security posture and prioritise their efforts based on their unique business context. Regardless of the one used, the most important thing is that organisations take a proactive and risk-based approach to cybersecurity and continuously assess and improve their security posture to stay ahead of potential threats.

If you need a threat modelling methodology, Aristiun has what you need! Our threat modelling platform has comprehensive tools and features to help you safeguard your systems from malicious attacks. Reach out to us today to request a demo!

Written by : (Expert in cloud visibility and oversight)

T Singh