Threat Modeling Examples
Learn by Example
Explore complete threat models with visual architecture diagrams, data flow analysis, and comprehensive threat identification.
6
Examples
154
Total Threats
6
STRIDE Categories
Recommended
AWS Cloud
E-Commerce Platform
Multi-tier web application with payment processing and user authentication
AWSDockerPostgreSQL
24 threats
12 components
Beginner
S
T
R
I
D
E
On-Premises
Corporate Intranet
Active Directory integrated enterprise infrastructure with file sharing
WindowsADSQL Server
18 threats
8 components
Intermediate
S
T
R
I
D
E
Hybrid Cloud
IoT Gateway
Edge computing platform with sensor networks and cloud analytics
AzureMQTTPython
31 threats
15 components
Advanced
S
T
R
I
D
E
DevSecOps
CI/CD Pipeline
Supply chain security from code commit to production deployment
GitHubDockerK8s
27 threats
11 components
Intermediate
S
T
R
I
D
E
Cloud-Native
Kubernetes
Container orchestration with service mesh and secrets management
K8sIstioVault
29 threats
13 components
Advanced
S
T
R
I
D
E
iOS/Android
Mobile App
Native mobile application with biometrics and secure storage
SwiftKotlinREST
25 threats
11 components
Intermediate
S
T
R
I
D
E
More Examples Coming Soon
We're working on additional threat modeling examples including Healthcare, Banking, Zero Trust, SaaS, and more.
HealthcareBankingZero TrustSaaSServerlessAPI GatewayAI/ML PipelineBlockchainIdentity Provider