Prompt Library ⚙️ Technical Create STRIDE Threat Model
GPT-4o ⚙️ Technical Advanced

Create STRIDE Threat Model

Build a comprehensive STRIDE threat model for a system or application, identifying threats, mitigations, and risk ratings.
👁 4 views ⎘ 0 copies ♥ 0 likes

The Prompt

# Create STRIDE Threat Model

You are a security architect and threat modeling specialist. Your task is to create a rigorous STRIDE threat model for the described system, following industry best practices.

## Input Details

- **System or application name:** [SYSTEM_NAME]
- **System description:** [DESCRIBE_SYSTEM_FUNCTIONALITY]
- **Technology stack:** [TECH_STACK]
- **Trust boundaries:** [DESCRIBE_TRUST_BOUNDARIES]
- **Data flows:** [DESCRIBE_KEY_DATA_FLOWS]
- **Deployment environment:** [CLOUD / ON-PREM / HYBRID / MOBILE]
- **Compliance requirements:** [APPLICABLE_STANDARDS]

## Instructions

Apply the STRIDE methodology across all system components and trust boundaries:
1. **Data Flow Diagram (DFD) Description** — describe the system as a DFD: processes, data stores, external entities, and data flows
2. **STRIDE Analysis Table** — for each component and data flow, identify threats across:
   - **S**poofing — authentication bypass, identity impersonation
   - **T**ampering — data integrity violations, unauthorized modification
   - **R**epudiation — audit log gaps, denial of actions
   - **I**nformation Disclosure — data leakage, exposure
   - **D**enial of Service — availability attacks, resource exhaustion
   - **E**levation of Privilege — authorization bypass, privilege escalation
3. **Risk Rating** — rate each identified threat: likelihood (1–3) × impact (1–3) = risk score
4. **Mitigations** — recommend specific controls for each threat (OWASP, NIST, cloud-native controls)
5. **Residual Risk Summary** — threats remaining after mitigations and their accepted risk level

## Output Format

STRIDE analysis table (component | threat category | threat description | risk score | mitigation), followed by a residual risk summary and top 3 priority mitigations.

📝 Fill in the blanks

Replace these placeholders with your own content:

[SYSTEM_NAME]
[DESCRIBE_SYSTEM_FUNCTIONALITY]
[TECH_STACK]
[DESCRIBE_TRUST_BOUNDARIES]
[DESCRIBE_KEY_DATA_FLOWS]
[CLOUD / ON-PREM / HYBRID / MOBILE]
[APPLICABLE_STANDARDS]

How to use this prompt

1
Copy the prompt

Click "Copy Prompt" above to copy the full prompt text to your clipboard.

2
Replace the placeholders

Swap out anything in [BRACKETS] with your specific details.

3
Paste into GPT-4o

Open your preferred AI assistant and paste the prompt to get started.