Threat Modeling Uncover Security Design Flaws Using The STRIDE Approach Shawn Hernan and Scott Lambert and Tomasz Ostwald and Adam Shostack Contents Designing Secure Software Threat Modeling and STRIDE Data Flow Diagrams A Sample System Applying STRIDE to the Fabrikam Analyzer Database Analyzing Data Flows and Data Stores Analyzing Processes Mitigating the Threats Finding Manifestations of Threats