IMPORTANT
The Software, the Examples, and every information provided on this Site are covered by a License: click here to access it.
Usage of any material provided implies acceptance of the License.
EXAMPLES ARE PROVIDED “AS THEY ARE”. NO WARRANTY OF ANY TYPE IS PROVIDED. NO SUPPORT IS PROVIDED FOR EXAMPLES.
Examples cover some common scenarios and show how it may be possible to use Threats Manager Studio.
They are not perfect: they are typically focused on simplified systems and have not the typical quality you would expect from a real Threat Model. Still, they can be leveraged to learn how to be a better Threat Modeler, and some of them are discussed in Posts published on this site.
For your convenience, we have collected here some Examples.
When possible, we have included multiple links:
- Download, allows to download the example file, in TM or TMJ format.
- Download Reference Word File is the Reference Word File used to generate the Example Report.
- Download Example Report is the Word Report generated for the Example File.
Example | Author | Ver | Link |
---|---|---|---|
Azure PaaS Core | Simone Curzi | 1.2 | Download SHA256 E6DFC92EFCB0572AAFF3BCA8E1CDCB409DAC085C3A5BEC74B6516FB3802781AC Download Reference Word File SHA256 51A9A43D0626DA35EDEDB8B4BE6C8F22EF23C4F75A987A4976CB0CE16518D531 Download Example Report SHA256 4DEFB16DC0632CAA34CFB5738EFB52527658C6E1974E6E1266F00A075626B0F7 |
If you have Examples you want to share with the Community, please upload them here.