Introduction
The Four-Question Framework for Threat Modeling

Question 1: What are we working on - Creating a threat model

Rome wasn't built in a day but it has to start somewhere.

2
min
Last updated
September 6, 2024

Contents

Create a diagram from scratch

Answer our questionnaire to create a diagram

Create from a Template

Import from a diagramming tool or Infrastructure as Code (IaC)

Use our AI Assistant, Jeff 

Embedded IriusRisk Project Diagrams in external tools

IriusRisk helps you to visualize the architecture of your application and create a data flow diagram (DFD) with its integrated Draw.io diagramming tool. You can also use additional data to inform your threat models through the use questionnaires available for each component, and by tagging data flows with data assets. You can use the diagramming or questionnaires in isolation, or combine them to produce a high fidelity model. With this data input, IriusRisk is capable of automatically generating refined and meaningful threats, weaknesses, and countermeasures.

We offer multiple ways of creating your diagram, depending on your level of threat modeling experience, your existing technology stack, and your preferred method of building. Here are your options:

  1. Create a data flow diagram from scratch in our user-friendly canvas 
  2. Answer our questionnaire to get part of the diagram created based upon your answers 
  3. Select from one of our predefined templates  
  4. Use our File Import Feature to import your Infrastructure as Code (IaC) files. Or if you need to use mapping files, you can do so via an API call from tools such as AWS CloudFormation, HashiCorp Terraform, Microsoft Threat Modeling Tool, draw.io, Lucidchart, and Microsoft Visio. 
  5. Use our AI Assistant, Jeff, to generate a diagram from user stories, documentation, meeting transcripts and more 

We will now go into each option to show how you can easily do this to get a few steps forward in your threat modeling journey. 

Close Modal