Threat Register
The Threat Register provides a consolidated, model-wide view of all threats associated with a threat model.
Instead of reviewing threats element by element, the Threat Register allows you to view, prioritize, and manage threats in a single stream—making it easier to assess risk and take action at scale.
Use the Threat Register when reviewing overall risk, planning remediation, or preparing threat data for export and tracking.
What is the Threat Register?
The Threat Register aggregates all threats generated for a threat model into a single list.
For each threat, the register displays:
- Threat title
- Status
- Priority
- Associated element
- Threat description
This view helps teams understand the full risk landscape of a model without navigating individual elements.
Tip
The Threat Register is most valuable once initial threat review has begun. It is not intended to replace element-level modeling, but to operationalize its output.
When to use the Threat Register
Use the Threat Register when you want to:
- Review all threats across the model in one place
- Identify high-risk or unmitigated threats
- Prepare for design or security reviews
- Plan remediation work
- Export threat data for external tracking
Avoid using the Threat Register: - Before attributes are applied - Before threats have been reviewed for relevance - As a substitute for validating model structure
Accessing the Threat Register
The Threat Register is accessed from the Threat Model canvas.
To open the Threat Register:
- Select a threat model
- Open the Threat Register using the clipboard icon in the top-right area of the canvas
Once opened, the register shows all threats associated with the current threat model.
Step 1: Review threats at a model-wide level
Start by scanning the full list of threats.
At this stage, focus on: - Overall threat volume - Obvious high-risk items - Threats with no mitigation status - Patterns across multiple elements
This pass is about orientation, not decision-making.
Tip
If the number of threats feels unexpectedly high or low, review attributes and trust boundaries before taking action.
Step 2: Prioritize threats
Use priority and status to focus attention.
When prioritizing threats, consider: - Impact if the threat were exploited - Likelihood based on exposure and controls - Whether the threat affects critical data or trust boundaries
High-priority threats should: - Be reviewed first - Have clear mitigation decisions - Be visible to stakeholders
Note
Priority reflects relative importance, not urgency or ownership.
Step 3: Review threat details and mitigations
Selecting a threat in the Threat Register reveals:
- The threat description
- Why it applies
- Associated mitigations
- Current mitigation status
Use this view to: - Validate that the threat is relevant - Confirm mitigation intent - Ensure mitigation status is intentional and documented
This step often identifies: - Missing mitigations - Inconsistent statuses - Opportunities to reduce noise using mitigating attributes
Step 4: Locate threats in the model
From the Threat Register, you can locate where a threat applies in the model.
When viewing a threat: - Select Show on Map - The associated element and threat are highlighted on the data flow diagram
Use this to: - Understand architectural context - Validate that threats align with the intended structure - Identify modeling gaps or incorrect assumptions
Tip
If a threat does not make sense in context, revisit attributes or flows before dismissing it.
Step 5: Decide what belongs in the Threat Register
The Threat Register is for tracking and prioritization, not deep modeling.
Belongs in the Threat Register: - Threats that require follow-up - Threats being tracked over time - Threats shared with stakeholders or teams
Does not belong in the Threat Register: - Unreviewed raw threat output - Architectural fixes still being modeled - Attribute experimentation
Warning
Treating the Threat Register as a backlog without review often leads to noise and loss of trust in the model.
Step 6: Decide when the Threat Register is “done enough”
A Threat Register is usually in a good state when:
- All threats have been reviewed for relevance
- High-priority threats have mitigation decisions
- Mitigation statuses are intentional
- The remaining threats are understood and accepted
Tip
The Threat Register reflects current understanding. It should evolve as the system and model evolve.
Exporting the Threat Register
Threat data from the Threat Register can be exported in CSV format.
CSV exports are useful for: - Tracking threats in external tools - Creating engineering backlog items - Sharing threat data with security or compliance teams - Performing custom analysis or reporting
Tip
Use CSV exports for operational workflows. Use PDF exports for documentation and stakeholder communication.
Exports represent a point-in-time snapshot of the Threat Register.
Common Threat Register anti-patterns
Avoid these common mistakes:
- Treating the register as a to-do list without validation
- Exporting before threat review is complete
- Ignoring low-priority threats entirely
- Letting mitigation statuses go stale
Note
A noisy or outdated Threat Register usually indicates upstream modeling or attribute issues.
What’s next
After working with the Threat Register:
- Update mitigations in Threats & Mitigations
- Reduce systemic noise with Mitigating Attributes
- Track completeness using the Threat Model Health Score
- Manage change using Threat Model Versioning & Restoring
The Threat Register turns threat modeling output into actionable, trackable work.