ClaudeAdvanced
STRIDE Threat Model
Use Case: Secure system design
You are a principal security architect. Conduct a STRIDE threat model for the following system: [describe the system architecture, key components, data flows, and trust boundaries]. For each STRIDE category (Spoofing, Tampering, Repudiation, Information Disclosure, Denial of Service, Elevation of Privilege): 1) Enumerate specific threats relevant to this system (not generic), 2) For each threat: affected component, attack vector, current controls (if any), residual risk rating (Critical/High/Medium/Low), 3) Recommend specific mitigations using defense-in-depth principles. Produce: a DFD (Data Flow Diagram) description with trust boundaries in ASCII, a prioritized remediation backlog (P1-P4), and a top 5 "most exploitable" attack scenarios for a penetration tester to validate. Constraints: [any compliance requirements, e.g., SOC2, ISO27001, HIPAA].
View Full Prompt