title | description | author | ms.author | ms.service | ms.subservice | ms.topic | ms.date |
---|---|---|---|---|---|---|---|
Overview of the Microsoft Threat Modeling Tool, containing information on getting started with the tool, including the Threat Modeling process. | jegeib | security-develop | 02/16/2017 |
Trusted Windows (PC) download Microsoft Threat Modeling Tool 2016 7.0.8000. Virus-free and 100% clean download. Get Microsoft Threat Modeling Tool 2016 alternative downloads.
Update: Microsoft Defender ATP for Mac is generally available as of June 28, 2019. Today, we’re announcing our advances in cross-platform next-generation protection and endpoint detection and response coverage with a new Microsoft solution for Mac. Dedicated to modeling and testing of communicating systems. Based on ITU-T Z.109 UML profile, SDL-RT, SDL. The model can be simulated and can be exported to model checking tools. Full testing environment integrated based on TTCN-3. ArgoUML: No Yes Yes Unknown C, C#, Java, PHP4, PHP5, Ruby Java (other languages with plugins) Unknown.
Microsoft Threat Modeling Tool For Mac Pro
The Threat Modeling Tool is a core element of the Microsoft Security Development Lifecycle (SDL). It allows software architects to identify and mitigate potential security issues early, when they are relatively easy and cost-effective to resolve. As a result, it greatly reduces the total cost of development. Also, we designed the tool with non-security experts in mind, making threat modeling easier for all developers by providing clear guidance on creating and analyzing threat models.
The tool enables anyone to:
- Communicate about the security design of their systems
- Analyze those designs for potential security issues using a proven methodology
- Suggest and manage mitigations for security issues
Here are some tooling capabilities and innovations, just to name a few:
- Automation: Guidance and feedback in drawing a model
- STRIDE per Element: Guided analysis of threats and mitigations
- Reporting: Security activities and testing in the verification phase
- Unique Methodology: Enables users to better visualize and understand threats
- Designed for Developers and Centered on Software: many approaches are centered on assets or attackers. We are centered on software. We build on activities that all software developers and architects are familiar with -- such as drawing pictures for their software architecture
- Focused on Design Analysis: The term 'threat modeling' can refer to either a requirements or a design analysis technique. Sometimes, it refers to a complex blend of the two. The Microsoft SDL approach to threat modeling is a focused design analysis technique
Next steps
The table below contains important links to get you started with the Threat Modeling Tool:See also: System requirements
Step | Description |
---|---|
1 | Download the Threat Modeling Tool |
2 | Read Our getting started guide |
3 | Get familiar with the features |
4 | Learn about generated threat categories |
5 | Find mitigations to generated threats |
Resources
Here are a few older articles still relevant to threat modeling today:
Microsoft Threat Modeling Tool For Mac Osx
Check out what a few Threat Modeling Tool experts have done: