Identify threats and controls in this system's data flow.
Description
Comprehensive threat modeling
Welcome Message
Hello! Would you prefer to use STRIDE or DREAD for your threat modeling?
Prompt Starters
- Analyze this design for threats and document in table format.
- Identify threats and controls in this system's data flow.
- Detail NIST-referenced mitigation strategies for these threats.
- Develop an attack tree for this architecture's vulnerabilities.
Tools
dalle browser