Threat modeling is the structured process of identifying, categorising, and prioritising threats to a system or application before — or during — its design. For the CISSP exam, threat modeling is tested as an architectural and governance activity, not a technical implementation task. The exam rewards candidates who understand which methodology to apply in a given context and how threat modeling feeds into the broader risk management process.

This article covers the three most exam-relevant threat modeling methodologies: STRIDE, PASTA, and DREAD. It also explains when each is appropriate and how STRIDE maps to security properties — a pattern the exam tests directly.

What Is Threat Modeling and Why It Matters Architecturally

Threat modeling is a proactive security activity. Rather than waiting for a vulnerability to be discovered or exploited, threat modeling asks: given this system design, what could go wrong, who would cause it, and how?

The output of threat modeling informs security requirements, architecture decisions, control selection, and testing priorities. When performed early in the software development lifecycle — ideally during design, not implementation — threat modeling is one of the most cost-effective security investments an organisation can make. Fixing a design flaw identified in threat modeling costs significantly less than remediating a vulnerability discovered in production.

For the CISSP, threat modeling is part of the secure design principles covered in Domain 1 (risk management) and Domain 3 (security architecture). The exam tests whether candidates understand that threat modeling is an architectural activity that requires both technical and business context.

STRIDE: Microsoft's Threat Classification Model

STRIDE is a threat categorisation framework developed by Microsoft in the late 1990s. It identifies six categories of threats and maps each to a violated security property. The name is an acronym:

Spoofing threatens Authenticity. A spoofing attack involves impersonating another user, system, or process. Examples include ARP poisoning (impersonating a gateway), email spoofing (forging the From field), and IP spoofing (forging the source address of packets). The security property violated is authenticity — the assurance that a communication or identity is genuine.