Lab2 Use Case Diagram & Threat Modelling
Lab2 Use Case Diagram & Threat Modelling
4.1 Install Microsoft Threat Modelling Tool in the VM (applicable if you are installing in local
drive)
https://www.microsoft.com/en-us/securityengineering/sdl/threatmodeling
The intent of this lab is to use STRIDE Threat Model approach by modelling Data Flow Diagram
(DFD) or Process Flow Diagram (PFP) of a web application login page. The diagram below is
what you need to model in the Threat Modelling tool. The diagram below is to do a threat model
based on a typical web server application topology below. The Threat Modelling Tool will help to
identify potential threats.
3) Click on the first box located at the top left-hand side. Choose the second selection: SDL (TM
Knowledge Base). Click in the box “Create A Model” to open a new template.
7) Do the rest for the respective icon Human User, Web Service. Notice that Human User are
found under “General External Interactor”. Alternatively, you can search for the word “Human
User” at the top uppermost search field.
9) Human User will access the web service via HTTPS request to the web service. You will
need to drag “HTTPS” line connector and click on any of dots available on “human user”.
11) Web service will response back with “Web Response” connector. Click on the word “Generic
Data Flow” and connect from Web service to Human User.
13) Changing the attribute of the SQL database in the element properties.
15) Create trust boundary. You will need to create a trust boundary where the Human user will
require to have internet remote access. Use “Internet Boundary”
22) Highlight all rows in the threat list and do a mouse right click. You can copy it into a
spreadsheet.
23) After reviewing each of the threats, the user can close off the item. As a threat analyst, the
user must update each record as either “not started”, “needs investigation”, “not applicable” or
“mitigated”. This will reduce the threat list