Link Search Menu Expand Document

OWASP Threat Dragon

Getting started with Threat Dragon models

Create a new model

If using the Web application

The Threat Dragon web variant stores its threat models in your GitHub repos. This is so that the models can stay close to the code they are modelling. Future versions will provide a deeper integration so watch this space but for now, when you login to Threat Dragon for the first time you will need to access Github.

To get started with your threat model access the welcome page and select click on the plus area.

You will then be presented with a list of your GitHub repositories. Pick the one where you want to store your new model. If you have more than 30 repos you might have to page through them until you find the one you want.

Once you have picked your target repo, you will be asked to pick a branch. Again, if you have more than 30 branches you might need to page. When you pick a branch you will be taken to the threat model edit page where you can enter general information about your model.

If using the Desktop application

The Threat Dragon desktop variant stores its threat models on your local filesystem. To get started with your threat model start the applications and from the welcome page select on the plus area, or pull down menu ‘New’. You will then need to save the model file - we did ot this way so that you can nbe sure your model can be saved.

You will then be taken straight to the threat model edit page where you can enter general information about your model.

Threat model edit page

The Title field is mandatory. All the rest are optional, but they provide context for your model. This can be useful if someone else has to pick the model up in the future. Click on the Edit button to start editing the threat model details.

  • Title - mandatory, all orhter fields are optional
  • Owner - typically a dev team or an individual
  • Reviewer - only one reviewer at present
  • High level system description - provides context for your model
  • Contributors - giving credit where it is due

You can add new contributors by clickin on ‘Add a new contributor …’.

Add some diagrams to your model by clicking on ‘Add a new diagram …’

Name your diagram and then Add to confirm or Cancel if you change your mind. At this stage you are just listing the diagrams and naming them. You add all the diagram elements later.

Once you have entered all the details you need remember to click Save. You can also Cancel to exit without saving, or Reload to undo any changes and revert to your last save.

In the web variant of Threat Dragon, models are saved in your chosen branch at a path like ThreatDragonModels/[model name]/[model title].json, so if you change title of your model it will delete the old model in GitHub and replace it with one at the new path.

Congratulations! You have got the basics done. Next step … mapping out your system in a diagram.

Loading a demo model

If you are wondering how to start you can load a sample threat model. On the welcome page you can download an example by clicking on the download area. If you are using the desktop application you can select ‘Open Demo Model’ pull down menu.

This should give you some ideas on how to get started with your own model, and has diagrams, model details and threats as examples.

Opening an existing model

Web application

If you have a repository that already has threat models, you can open them by clicking on the open area on the Welcome page. You will then be able to select a repo and branch and then you will be able to choose from a list of models.

Desktop application

If you have an existing model file saved locally, you can open it by clicking on the open area on the Welcome page. You will then be able to navigate to the model file in your local file system and open it.

The demo model should give you some ideas on how to get started with your own model.

Threat model report

From the Threat Model details view you can see a summary report of your model listing the diagrams, elements and threats. Towards the bottom right of the page click on the Report button.

You can then customise the report to show or hide:

  • Out of scope model elements
  • Mitigated threats
  • Threat model diagrams

On the desktop variant of Threat Dragon you can Print the report or Save it as a PDF. On the web variant, you can Print the report and then, on most browsers, the print dialog allows you to save the report as a PDF.