I worked with ThreatModeler Platform for more than 1.2 years during the security design reviews and the risk assessment activities for the applications and the cloud projects.
My main use case for using ThreatModeler Platform in one of those scenarios was identifying the security risk earlier during the application design or the infrastructure change projects before they reach production. I mainly used it for threat modeling for new applications and reviewing the architecture security risk, mapping threats into controls, and supporting secure SDLC processes and DevOps security reviews, as well as cloud architecture risk assessment and compliance documentation. I was involved in a web application handling scenario where the user logs in and APIs and database integrations were involved. Before deployment, we used ThreatModeler Platform to review the architecture, which highlighted risks such as weak authentication flows, insecure APIs, exposures, and insufficient segmentations between the application and the database layer. Because those issues were identified earlier, the development team made necessary changes before production releases. That saved future rework and reduced risk. On a day-to-day basis, it is mainly used for reviewing new architecture diagrams, generating threat models, identifying STRIDE style risks, assigning mitigation actions, and maintaining documentation for audits.
ThreatModeler Platform's ability to measure and mitigate risks across different attack surfaces has helped my organization, especially in identifying risks in web apps and cloud apps. For example, suppose a company is launching a customer login portal with a login page, password reset option, payment page, and backend database. ThreatModeler Platform helps identify risks such as no MFA on the login page, a weak password reset flow, possible SQL injections in search fields, sensitive data not being encrypted, and an admin panel exposed to the internet. I mainly used this tool for red teaming exercises, including web application testing and VAPT testing. During this process, we utilized ThreatModeler Platform to identify risks, and we were also involved in testing almost all of India's government applications, where we tested them with a variety of tools available in the market. We have also started using artificial intelligence tools to test web applications and cloud host applications. In real-time, I use it in preventing ransomware entry, unauthorized access, and data leakage by fixing permissions and access controls early on.
ThreatModeler Platform has helped my security team keep pace with DevOps sprints by acting as a bridge between the security team, developers, and cloud development team. Instead of security checking everything at the end, all teams can identify risks earlier and fix them during the project itself. For instance, if developers are building a login portal, ThreatModeler Platform highlights missed elements such as MFA, which makes the password reset flow insecure and could expose sensitive data stored without encryption. The benefits to the developer include fixing issues during the coding stage and reducing rework later, leading to improved secure coding awareness. Instead of security reaching the app before releases, developers and the DevOps team can address issues earlier.