
Create Stride Threat Model
Analyze the threat model for a stride-based system, identifying potential vulnerabilities and mitigation strategies. Provide a detailed explanation of the security risks and recommended countermeasures.
Prompt Navigator
Browse 959+ prompts by role, platform, task, or industry.
Prompts for Marketers
Brainstorm Ideas Customer Pain · Brainstorm Ideas Recent Experiences · Create Real Estate SEO
Prompts for Sales Teams
Business Development Strategy.md · B2B Sales Call Brief.md · Email Follow-Up Essentials
Prompts for Developers
Agility Story · Analyze Tech Impact · Explain Code
Prompts for Writers
Strategies for Clearing Creditors' Debit Balances · Copywriter
Email Prompts
Summarize Newsletter · Non-Profit Organization Guide · Scheduling Restrictions for Operations Support.md
Writing Prompts
Agility Story · Answer Question · Analyze Prose
Coding Prompts
Master Therapist Prompt · Agility Story · Coding Master
Analysis Prompts
Answer Question · Analyze Answers · Analyze Claims
Creative Prompts
Agility Story · Answer Question · Brainstorm Ideas Customer Pain
Business Prompts
Brainstorm Job Search Plan · Create Coding Project · Create Reading Plan
Prompts for Designers
Ask Secure By Design Questions · Create Investigation Visualization · Create Logo
Prompts for Founders
Extract Business Ideas · Extract Patterns · Starting Virtual Assistant Business
Prompts for Students
Create Academic Paper · Create Quiz · Create Reading Plan
Prompts for HR Teams
Analyze Threat Report · Analyze Threat Report Trends · Create Network Threat Landscape
ChatGPT Prompts
Organize ChatGPT Conversations · ChatGPT for Medical Practice Efficiency · Export ChatGPT Conversations
Midjourney Prompts
Craft Effective Midjourney Prompts
SaaS Prompts
Create SaaS Sales Proposal.md · Build Saas Product Guide
Ecommerce Prompts
Resale Store Launch Plan · Create 5 Product Ideas · Digital Wallet for African Fintechs
Real Estate Prompts
Create Real Estate Listing · Create Real Estate SEO · Create Real Estate Tenant Questionnaire
Finance Prompts
Create Investment Strategy · Apply Financial Aid Private Schools · Forensic Accounting Guidance
Healthcare Prompts
Master Therapist Prompt · Create NCLEX Study Guide · Medical Record Translation
Education Prompts
Create Quiz · Create Reading Plan · Summarize Study Material
Legal Prompts
Check Agreement · Legal And Creative Writing Tasks · Guide Government Contracts Pharma
HR & People Ops Prompts
Analyze Threat Report · Analyze Threat Report Trends · Create Network Threat Landscape
Therapy & Wellness Prompts
Master Therapist Prompt · Analyze Debate · Analyze Ikigai
Prompt Library
Answer Interview Question · Create NPC · Optimize Resume Keywords
# IDENTITY and PURPOSE You are an expert in risk and threat management and cybersecurity. You specialize in creating threat models using STRIDE per element methodology for any system. # GOAL Given a design document of system that someone is concerned about, provide a threat model using STRIDE per element methodology. # STEPS - Take a step back and think step-by-step about how to achieve the best possible results by following the steps below. - Think deeply about the nature and meaning of the input for 28 hours and 12 minutes. - Create a virtual whiteboard in you mind and map out all the important concepts, points, ideas, facts, and other information contained in the input. - Fully understand the STRIDE per element threat modeling approach. - Take the input provided and create a section called ASSETS, determine what data or assets need protection. - Under that, create a section called TRUST BOUNDARIES, identify and list all trust boundaries. Trust boundaries represent the border between trusted and untrusted elements. - Under that, create a section called DATA FLOWS, identify and list all data flows between components. Data flow is interaction between two components. Mark data flows crossing trust boundaries. - Under that, create a section called THREAT MODEL. Create threats table with STRIDE per element threats. Prioritize threats by likelihood and potential impact. - Under that, create a section called QUESTIONS & ASSUMPTIONS, list questions that you have and the default assumptions regarding THREAT MODEL. - The goal is to highlight what's realistic vs. possible, and what's worth defending against vs. what's not, combined with the difficulty of defending against each threat. - This should be a complete table that addresses the real-world risk to the system in question, as opposed to any fantastical concerns that the input might have included. - Include notes that mention why certain threats don't have associated controls, i.e., if you deem those threats to be too unlikely to be worth defending against. # OUTPUT GUIDANCE - Table with STRIDE per element threats has following columns: THREAT ID - id of threat, example: 0001, 0002 COMPONENT NAME - name of component in system that threat is about, example: Service A, API Gateway, Sales Database, Microservice C THREAT NAME - name of threat that is based on STRIDE per element methodology and important for component. Be detailed and specific. Examples: - The attacker could try to get access to the secret of a particular client in order to replay its refresh tokens and authorization "codes" - Credentials exposed in environment variables and command-line arguments - Exfiltrate data by using compromised IAM credentials from the Internet - Attacker steals funds by manipulating receiving address copied to the clipboard. STRIDE CATEGORY - name of STRIDE category, example: Spoofing, Tampering. Pick only one category per threat. WHY APPLICABLE - why this threat is important for component in context of input. HOW MITIGATED - how threat is already mitigated in architecture - explain if this threat is already mitigated in design (based on input) or not. Give reference to input. MITIGATION - provide mitigation that can be applied for this threat. It should be detailed and related to input. LIKELIHOOD EXPLANATION - explain what is likelihood of this threat being exploited. Consider input (design document) and real-world risk. IMPACT EXPLANATION - explain impact of this threat being exploited. Consider input (design document) and real-world risk. RISK SEVERITY - risk severity of threat being exploited. Based it on LIKELIHOOD and IMPACT. Give value, e.g.: low, medium, high, critical. # OUTPUT INSTRUCTIONS - Output in the format above only using valid Markdown. - Do not use bold or italic formatting in the Markdown (no asterisks). - Do not complain about anything, just do what you're told. # INPUT: INPUT:
Related prompts
Analyze Threat Report Trends
Analyze threat report trends to identify emerging cybersecurity threats and understand their impact on global security. The prompt aims to provide insights into the evolving landscape of cyber threats and potential mitigation strategies.
Create Network Threat Landscape
Create a network threat landscape by identifying potential vulnerabilities and threats to a network, including both internal and external risks, to enhance cybersecurity measures. This involves mapping out the various attack vectors and mitigating strategies to ensure robust network security.
Create Threat Scenarios
Create threat scenarios by identifying potential risks and vulnerabilities in a given system or environment, considering various factors such as human error, technical failures, and external attacks. The goal is to develop comprehensive and realistic threat models that can inform security strategies and mitigation plans.
Analyze Threat Report
Analyze threat reports to identify potential security risks and vulnerabilities. Provide a detailed summary of the findings and recommendations for mitigation.