STRIDE Threat Model framework is an interactive educational tool that demonstrates the application of the Microsoft STRIDE framework to automotive telemetry systems. This tool helps security professionals, developers, and automotive engineers understand and mitigate security threats in connected vehicle architectures.
- π Interactive Threat Analysis - Visual STRIDE categorization with detailed threat scenarios
- ποΈ Architecture Visualization - Animated Data Flow Diagrams (DFD) with trust boundaries
- π‘οΈ Risk Mitigation Planning - Defense-in-depth security control implementation
- π Professional Reporting - Comprehensive security assessment documentation
- π¨ Beautiful Interface - Modern, responsive design with smooth animations
- Modern web browser (Chrome, Firefox, Safari, Edge)
- GitHub account (for deployment)
-
Clone the repository
git clone https://github.com/your-username/stride-threat-modeler.git cd stride-threat-modeler -
Serve the application
# Using Python 3 python -m http.server 8000 # Using Node.js npx serve . # Using PHP php -S localhost:8000
-
Open in browser
http://localhost:8000
-
Fork this repository or create a new one
-
Upload all files to your repository
-
Enable GitHub Pages in repository settings:
- Go to Settings β Pages
- Select Source:
Deploy from a branch - Select Branch:
main(or your default branch) - Click Save
-
Access your application at:
https://your-username.github.io/stride-threat-modeler
| Component | Trust Level | Description | Security Controls |
|---|---|---|---|
| Car TCU | π High | Telematics Control Unit in vehicle | Secure Boot, HSM, Firmware Signing |
| Cellular Network | π« None | Public 4G/5G infrastructure | TLS 1.3, Network Segmentation |
| IoT Gateway | π‘ Medium | Cloud message broker | mTLS, API Gateway, WAF |
| Telemetry DB | π High | Time-series database | Encryption at Rest, RBAC, Backup |
- π Vehicle Trust Zone - High trust, physical access required
- π Public Network - Zero trust, untrusted infrastructure
- βοΈ Cloud Trust Zone - Managed trust, validated inputs only
| Category | Icon | Description | Example Threat |
|---|---|---|---|
| Spoofing | π΅οΈ | Identity impersonation | TCU Identity Spoofing |
| Tampering | βοΈ | Data modification | Telemetry MITM Attack |
| Repudiation | β | Action denial | Remote Command Repudiation |
| Information Disclosure | ποΈ | Data exposure | GPS History Leak |
| Denial of Service | π« | Service degradation | Gateway DDoS Attack |
| Elevation of Privilege | β¬οΈ | Unauthorized access | Remote Code Execution |
-
π Physical Security
- Hardware Security Modules
- Secure Element
- Tamper Detection
-
π Network Security
- TLS 1.3 Encryption
- Network Segmentation
- Cloud WAF & DDoS Protection
-
βοΈ Application Security
- Input Validation
- Secure Coding Practices
- mTLS Authentication
-
πΎ Data Security
- Encryption at Rest (AES-256)
- Field-level Encryption
- Secure Key Management
-
π€ Identity & Access
- Role-Based Access Control
- Multi-Factor Authentication
- Certificate-based Authentication
-
π Monitoring & Response
- Security Information & Event Management
- Audit Logging
- Incident Response Planning
- Review system architecture and trust boundaries
- Understand data flow and component interactions
- Identify critical assets and trust zones
- Select STRIDE categories to analyze specific threats
- Review detailed attack scenarios and risk assessments
- Understand impact and likelihood ratings
- Implement security controls for identified threats
- Track mitigation progress with real-time scoring
- View defense-in-depth strategy implementation
- Generate comprehensive security assessment reports
- Document compliance with automotive standards
- Print professional reports for stakeholders
- Animated data flow with real-time threat highlighting
- Trust boundary visualization with color-coded zones
- Component interaction with security status indicators
- Attack vector mapping with animated indicators
- Real-time risk assessment based on implemented controls
- CVSS integration for standardized vulnerability scoring
- Compliance tracking against automotive security standards
- Progress visualization with animated progress rings
- Executive summaries for business stakeholders
- Technical deep dives for security teams
- Compliance documentation for regulatory requirements
- Actionable recommendations for improvement
This tool helps demonstrate compliance with:
- β ISO 21434 - Road vehicles cybersecurity engineering
- β UN R155 - Cybersecurity and cybersecurity management system
- β SAE J3061 - Cybersecurity guidebook for cyber-physical vehicle systems
- β NIST CSF - Cybersecurity Framework
- β GDPR - General Data Protection Regulation
stride-threat-modeler/
β
βββ index.html # Main application entry point
βββ styles.css # Enhanced styling and animations
βββ data.js # Threat data, components, and constants
βββ app.js # Main application logic
β
βββ assets/ # Additional resources (optional)
β βββ images/
β βββ icons/
β
βββ README.md # This file
- Frontend: HTML5, CSS3, JavaScript (ES6+)
- Styling: Tailwind CSS, Custom CSS animations
- Icons: Font Awesome 6
- Charts: SVG-based progress indicators
- Storage: LocalStorage for state persistence
- β Chrome 90+
- β Firefox 88+
- β Safari 14+
- β Edge 90+
We welcome contributions! Please see our Contributing Guide for details.
- Fork the repository
- Create a feature branch (
git checkout -b feature/amazing-feature) - Commit your changes (
git commit -m 'Add amazing feature') - Push to the branch (
git push origin feature/amazing-feature) - Open a Pull Request
This project is licensed under the MIT License - see the LICENSE file for details.
- Documentation: This README and in-app guidance
- Issues: GitHub Issues
- Discussions: GitHub Discussions
- Microsoft for the STRIDE threat modeling methodology
- ISO/SAE for automotive cybersecurity standards
- UNECE for UN R155 regulations
- Open source community for tools and inspiration
Built with β€οΈ for the automotive security community