PrimeThreat - Visual Threat Modeling
Public Cloud (AWS)

E-Commerce Platform

A multi-tier web application handling user authentication, product catalog, shopping cart, and payment processing. This threat model demonstrates common vulnerabilities in cloud-hosted e-commerce systems.

System Architecture

Click on any asset to see detailed information. The diagram shows security zones from untrusted (Internet) to highly-trusted (Data Tier).

Scroll horizontally to see full diagram
InternetuntrustedCustomersMobileDMZsemi trustedCDNWAFLBWeb Tiersemi trustedWeb 1Web 2App TiertrustedAPIAuthOrdersData Tierhighly trustedPostgresRedisS3

Internet

Untrusted

DMZ

Semi-trusted

Web Tier

Semi-trusted

App Tier

Trusted

Data Tier

Highly Trusted

Key Security Principle: Defense in Depth

Notice how traffic must pass through multiple security zones before reaching sensitive data. Each zone adds a layer of protection: WAF filters attacks, Load Balancer distributes traffic, and API Gateway authenticates requests. This means an attacker must bypass multiple controls to reach the data tier.