Threat Dragon is a free, open-source, cross-platform threat modeling application. This tool provides for the creation of threat model data-flow diagrams and entering of associated threats along with their remediations.
Threat Dragon supports STRIDE1, LINDDUN2, CIA3, DIE4 and PLOT4ai5
Threat Dragon is an OWASP Lab Project and follows the values and principles of the threat modeling manifesto. An introduction to Threat Dragon is provided by the OWASP Spotlight series, and a different take on Threat Dragon is provided by Threat Modeling Gamification.
There is a good overview of threat modeling and risk assessment from OWASP, and this expands on what the Threat Dragon project aims for:
The application comes in two variants:
The following translations are built into the Threat Dragon application:
Threat Dragon maintains a Demo Instance that is hosted on Heroku. We strongly recommend using a self-hosted instance or the desktop application as the most secure options.
1: Spoofing, Tampering, Repudiation, Information disclosure,
DoS, Elevation of privilege
2: Linkability, Identifiability, Non-repudiation, Detectability,
Disclosure of information, Unawareness, Non-compliance
3: Confidentiality, Integrity, Availability
4: Distributed, Immutable, Ephemeral
5: Privacy Library Of Threats 4 Artificial Intelligence
Threat Dragon: making threat modeling less threatening