This curriculum equips teams to implement threat modelling as an ongoing, integrated practice within ISO 27001-aligned risk and compliance workflows, comparable to the iterative cycles seen in multi-phase internal audit preparation and continuous control improvement programs.
Module 1: Aligning Threat Modelling with ISO 27001 Risk Assessment Processes
- Integrate threat modelling outputs directly into Statement of Applicability (SoA) justification for control selection.
- Map identified threats to ISO 27001 Annex A controls to validate coverage gaps in existing controls.
- Determine whether threat modelling occurs before or after risk treatment planning to avoid redundant analysis.
- Define ownership for maintaining threat models when risk assessments are updated annually or post-incident.
- Use threat modelling to support risk scenario development in line with ISO 27005 risk assessment methodology.
- Ensure threat model scope aligns with ISMS scope boundaries, especially in multi-tenant or hybrid environments.
- Document threat modelling assumptions in risk assessment records for auditor review and traceability.
- Coordinate threat modelling timelines with internal audit schedules to ensure findings are addressed in corrective action plans.
Module 2: Scoping and Asset Identification for Targeted Threat Analysis
- Select critical systems for threat modelling based on business impact analysis and data classification levels.
- Define data flows for high-value assets such as customer PII, intellectual property, and financial records.
- Identify shadow IT components that process sensitive data but are excluded from the ISMS scope.
- Classify assets by residency (on-prem, cloud, third-party) to adjust threat modelling techniques accordingly.
- Establish criteria for re-scoping threat models when new applications are integrated into existing systems.
- Use data flow diagrams (DFDs) to visualize trust boundaries between internal and external systems.
- Validate asset ownership with business unit leads to ensure accountability in threat response planning.
- Exclude non-critical legacy systems from detailed modelling while documenting risk acceptance rationale.
Module 3: Selecting and Adapting Threat Modelling Methodologies
- Choose STRIDE over PASTA for internal systems where technical architecture details are well-documented.
- Apply attack trees for high-risk payment processing systems to quantify exploit paths and likelihood.
- Modify the OCTAVE Allegro approach to include compliance drivers specific to ISO 27001 control objectives.
- Use hybrid models when cloud services require both architectural and policy-level threat analysis.
- Standardize template formats for threat models to ensure consistency across business units and audit readiness.
- Adjust methodology rigor based on system criticality—lightweight models for low-risk internal tools.
- Train architects to apply threat modelling during design phase rather than retrofitting post-deployment.
- Document methodology selection rationale in the risk register for auditor traceability.
Module 4: Identifying and Prioritizing Threat Agents and Motivations
- Classify threat agents by capability and intent (e.g., insider with admin access vs. script kiddie).
- Assess likelihood based on historical incident data from SIEM and SOC reports.
- Factor in geopolitical risks when systems are hosted in high-threat jurisdictions.
- Include third-party vendors as potential threat sources in supply chain risk assessments.
- Adjust threat agent profiles when mergers or layoffs increase insider risk.
- Use threat intelligence feeds to update profiles for emerging APT groups targeting the industry.
- Differentiate between opportunistic and targeted attacks when allocating mitigation budgets.
- Validate threat agent assumptions with physical security and HR teams for insider scenarios.
Module 5: Defining and Validating Attack Vectors and Vulnerabilities
- Map attack vectors to specific system interfaces (APIs, user inputs, file uploads).
- Correlate identified vulnerabilities with existing findings from penetration tests and vulnerability scans.
- Assess default configurations in cloud services (e.g., S3 buckets, IAM roles) as potential attack vectors.
- Validate zero-day assumptions by consulting vendor advisories and CERT bulletins.
- Include misconfigurations due to IaC (Terraform, CloudFormation) templates in vulnerability analysis.
- Identify privilege escalation paths through service accounts with excessive permissions.
- Document insecure deserialization or injection points in custom-developed applications.
- Use automated SAST tools to verify manual threat model findings during code review.
Module 6: Evaluating Controls and Mitigation Strategies
- Assess whether existing ISO 27001 controls (e.g., A.9 Access Control) sufficiently mitigate identified threats.
- Design compensating controls when technical mitigations are not feasible within project timelines.
- Implement WAF rules to address injection threats when code remediation is delayed.
- Justify control enhancements based on cost-benefit analysis tied to single loss expectancy (SLE).
- Integrate logging and monitoring controls to detect exploitation of residual threats.
- Enforce MFA for administrative access as a baseline mitigation for credential theft threats.
- Use network segmentation to isolate high-risk systems when end-to-end encryption is not viable.
- Document control effectiveness metrics for inclusion in management review reports.
Module 7: Integrating Threat Modelling into SDLC and Change Management
- Embed threat modelling checkpoints in sprint planning for Agile development teams.
- Require threat model updates before production deployment in change advisory board (CAB) reviews.
- Assign security champions to facilitate threat modelling in development teams without dedicated security staff.
- Automate threat model validation using CI/CD pipelines with policy-as-code tools (e.g., OPA).
- Update threat models when third-party libraries are upgraded or replaced.
- Archive outdated threat models and link them to version-controlled system documentation.
- Conduct threat modelling re-assessments after major architectural changes (e.g., migration to microservices).
- Train DevOps engineers to interpret threat model outputs for infrastructure hardening.
Module 8: Reporting, Documentation, and Audit Readiness
- Structure threat model reports to align with ISO 27001 documentation requirements for risk treatment plans.
- Include threat model outputs in internal audit workpapers upon request.
- Maintain version history of threat models to demonstrate continuous improvement.
- Redact sensitive details in threat models shared with external auditors or regulators.
- Link residual risks from threat models to risk acceptance forms signed by business owners.
- Use standardized templates to ensure all threat models contain threat descriptions, mitigations, and owners.
- Archive threat models in the organization’s GRC platform for centralized access.
- Prepare executive summaries of high-risk threats for inclusion in board-level risk reports.
Module 9: Continuous Threat Model Maintenance and Review
- Schedule quarterly reviews of threat models for critical systems regardless of changes.
- Trigger ad-hoc reviews following security incidents affecting similar system architectures.
- Update threat models when new regulatory requirements (e.g., NIS2, DORA) impact control expectations.
- Integrate threat intelligence updates into model assumptions about attacker capabilities.
- Reassess threat models after onboarding new cloud service providers.
- Assign accountability for model updates to system owners in the risk register.
- Use automated asset discovery tools to detect unmodelled systems processing sensitive data.
- Measure model effectiveness by tracking whether predicted threats materialized in incident data.