The Microsoft Threat Modeling Tool (TMT) 2016 is designed to guide you and your product team through the threat modeling process. TMT functionality includes:
An easy drawing environment.
Automatic threat generation using the STRIDE per interaction approach.
Define your own template for threat modeling
An option for user-defined threats to be added.
Using Microsoft Threat Modeling Tool (TMT) you can graphically identify processes and data flows that comprise an application or service.
For Previous Users of Threat Modeling Tool
If you have TMT 2014, it must be un-installed before installing TMT 2016. All the models created using TMT 2014 can be opened using TMT 2016.
Operating System Support
The table shows the operating systems supported by Microsoft Threat Modeling Tool 2016.
Table 1 Supported Operating Systems
Microsoft Threat Modeling Tool 2016 and supporting documentation can be downloaded from http://microsoft.com/security/sdl.
Go to Control Panel > Programs and Features.
Right-click Microsoft Threat Modeling Tool and select Uninstall.
How to Run Threat Modeling Tool
This guide will provide basic guidance on how to create a new threat template and a new threat model. This Getting Started Guide covers:
1. Creating a new threat model
Opening an existing threat model
Converting a threat model from TMT(.tm4) format to the new TMT (.tm7) format
Creating a new threat template
Opening/Modifying an existing threat template
Upgrade threat model to new template
For more details about TMT, see Microsoft Threat Modeling Tool 2016 User Guide, available at http://microsoft.com/security/sdl.
Starting Threat Modeling Tool 2016
To start TMT, click the “Microsoft Threat Modeling Tool” desktop shortcut.
You can also start TMT from the command line. Open a command window and execute:
%programfiles(x86)%\Microsoft Threat Modeling Tool 2016\TMT7.exe
Creating a New Threat Model
This section describes the steps to create a new threat model.
1. Start TMT. From Home screen, browse a template you want to use for the threat model.
1. Click on Create a Model from home screen. This brings up the drawing surface where you will create the data flow diagram.
Figure 1 Threat Modeling Tool Drawing Surface
Drawing Your Model
Draw your data flow diagram by selecting elements from the Stencils pane. You can select processes, external entities, data stores, data flows, and trust boundaries.
1. To select an element to draw, click on the corresponding icon in the Stencils pane. You can also select an element from the Stencils pane and drag it across the drawing surface.
1. Right-click on the drawing surface to bring up a context menu that allows you to add a generic element from each Stencils category
1. To add a data flow between the two most recently selected objects, right-click the drawing surface and select Connect or Bi-Directional Connect. Alternatively, select the appropriate data flow from the Flow tab in the Stencils pane and place it on the drawing surface.
Figure 2 Sample Threat Model Showing a Data Flow
To more fully describe the data flows in your system, specify attributes for the elements in your diagram. Right-clicking an element to convert it to another element type. If necessary, convert it from a generic element to a specific type of process, data flow, data store, external element, or trust boundary. For example, a generic data flow can be converted to HTTPS. Additionally, you can edit the properties of the element directly in the Properties pane.
Figure 3 Identifying a Data Flow as HTTPS
When you have completed your data flow diagram, switch to the Analysis view by using one of the following methods:
From the View menu, select Analysis View.
Click the Analysis View button on the toolbar.
Figure 4 Selecting Analysis View from the Toolbar
Entering Mitigation Information
For each of your threats, enter information about how to mitigate the threat:
1. Determine if the threat requires mitigation and categorize the mitigation by selecting one of the following options from the Threat Status dropdown list.
6. Not Started
6. Needs Investigation
6. Not Applicable
Figure 5 Selecting Mitigation Information
Select one of the following threat priorities from the Threat Category dropdown list.
d) High (default)
Enter your mitigation information in the Justification for threat state change text box.
NOTE: Justification is required for threats in the Mitigated or Not Applicable states.
There are no bids yet.
All Rights Reserved, Dataedy.com 2020