Examples

IMPORTANT
The Software, the Examples, and every information provided on this Site are covered by a License: click here to access it.
Usage of any material provided implies acceptance of the License.
EXAMPLES ARE PROVIDED “AS THEY ARE”. NO WARRANTY OF ANY TYPE IS PROVIDED. NO SUPPORT IS PROVIDED FOR EXAMPLES.

Examples cover some common scenarios and show how it may be possible to use Threats Manager Studio.

They are not perfect: they are typically focused on simplified systems and have not the typical quality you would expect from a real Threat Model. Still, they can be leveraged to learn how to be a better Threat Modeler, and some of them are discussed in Posts published on this site.


For your convenience, we have collected here some Examples.

When possible, we have included multiple links:

ExampleAuthorVerLink
Azure PaaS CoreSimone Curzi1.2Download
SHA256: E6DFC92EFCB0572AAFF3BCA8E1CDCB409DAC085C3A5BEC74B6516FB3802781AC
Download Reference Word File
SHA256: 51A9A43D0626DA35EDEDB8B4BE6C8F22EF23C4F75A987A4976CB0CE16518D531
Download Example Report
SHA256: 4DEFB16DC0632CAA34CFB5738EFB52527658C6E1974E6E1266F00A075626B0F7