Skip to content

Threat Modeling

The Threat Modeling guides show you how to build, analyze, and maintain threat models in Devici.
They focus on how Devici represents systems, how threats are generated, and how you drive actionable security outcomes from your models.

Use these guides when you are creating a new threat model, evolving an existing one, or validating security posture as your system changes.

Start here

If you’re new to threat modeling in Devici, begin with:

  • Building a Threat Model
    Learn the end-to-end workflow for creating a threat model, from defining scope to reviewing generated threats.

Core threat modeling concepts

These guides explain the foundational building blocks Devici uses to represent your system:

  • Elements
    Understand processes, data stores, and external entities, and how they form the structure of your threat model.

  • Data Flows & Trust Boundaries
    Learn how information moves through your system and where trust boundaries introduce risk.

  • Attributes
    See how attributes describe security-relevant characteristics and drive threat generation.

From model to action

Once your system is modeled, these guides help you turn structure into outcomes:

Managing change over time

Threat models are living artifacts. These guides help you keep them accurate and useful: