LLMpediaThe first transparent, open encyclopedia generated by LLMs

STRIDE model

Generated by GPT-5-mini
Note: This article was automatically generated by a large language model (LLM) from purely parametric knowledge (no retrieval). It may contain inaccuracies or hallucinations. This encyclopedia is part of a research project currently under review.
Article Genealogy
Expansion Funnel Raw 73 → Dedup 0 → NER 0 → Enqueued 0
1. Extracted73
2. After dedup0 (None)
3. After NER0 ()
4. Enqueued0 ()
STRIDE model
NameSTRIDE model
TypeThreat modeling framework
DeveloperMicrosoft Threat Modeling Team
Introduced1999
PurposeSecurity threat classification

STRIDE model

The STRIDE model is a mnemonic-based threat classification framework developed to categorize security threats during system design and analysis. It is widely used in software engineering, information security, and risk assessment to guide threat identification across platforms and protocols. Practitioners integrate STRIDE with design reviews, architecture diagrams, and mitigation planning in enterprise and open-source projects.

Overview

STRIDE groups threats into discrete categories to aid systematic analysis during design and review processes. The model is often taught alongside methodologies and artifacts from Microsoft engineering practices, compared with approaches used by National Institute of Standards and Technology and referenced in curricula from Massachusetts Institute of Technology, Stanford University, and Carnegie Mellon University. Security teams from organizations such as Amazon (company), Google, Facebook, IBM, and Oracle Corporation apply STRIDE when assessing cloud services, application programming interfaces, and distributed systems. Frameworks and tools from vendors like OWASP, ISACA, SANS Institute, and ENISA commonly cross-reference STRIDE during threat modeling exercises.

Origins and Development

STRIDE was introduced by members of the threat modeling team at Microsoft in the late 1990s and formalized in internal and external guidance as part of secure development lifecycles. Its publication coincided with contemporaneous work in threat analysis by researchers affiliated with CERT Coordination Center, MITRE Corporation, and standards bodies such as IEEE. Early adopters included engineering groups at Sun Microsystems, Intel Corporation, and research labs connected to University of California, Berkeley and University of Cambridge. Over time STRIDE was disseminated through conferences like Black Hat, DEF CON, RSA Conference, and Usenix Security Symposium, and documented in books and courses produced by authors associated with Addison-Wesley and O'Reilly Media.

Components of the STRIDE Model

STRIDE comprises categories that map common threat types to security properties; each category corresponds to a mnemonic letter used to drive checklist-based analysis. Security engineers often relate STRIDE categories to controls described in standards such as ISO/IEC 27001, PCI DSS, and guidance from National Cyber Security Centre (UK).

Practitioners associate STRIDE categories with attack patterns cataloged by MITRE ATT&CK and mitigation strategies demonstrated in case studies from Microsoft Research and academic papers from Harvard University and Princeton University. Integration with modeling languages and tools—such as those from UML, BPMN, Microsoft Threat Modeling Tool, and repositories maintained by GitHub and GitLab—facilitates mapping threats to components in architectures developed at companies like Salesforce and VMware.

Applications and Use Cases

The STRIDE model is applied in design reviews for web applications, mobile platforms, embedded systems, and industrial control systems. Teams at Apple Inc., Cisco Systems, Siemens, and Schneider Electric have used STRIDE-informed processes to evaluate firmware, network appliances, and operational technology. STRIDE is invoked in threat modeling exercises accompanying regulatory compliance programs tied to laws and directives such as HIPAA, GDPR, and Sarbanes–Oxley Act. In education, instructors at University of Oxford, University of Edinburgh, and Imperial College London teach STRIDE as part of courses on secure software engineering, often alongside case studies involving LinkedIn, Twitter, Uber, and Airbnb security incidents. Incident response teams from FireEye, CrowdStrike, and Kaspersky reference STRIDE when mapping observed tactics to design deficiencies.

Evaluation and Criticisms

While STRIDE is lauded for simplicity and mnemonic utility, academics and practitioners critique its scope and granularity compared to taxonomies like MITRE ATT&CK and structured methods from NIST. Critics from research groups at ETH Zurich and TU Delft have argued that STRIDE can encourage checklist thinking and may miss socio-technical threats emphasized in studies by Stanford Center for Internet and Society and Oxford Internet Institute. Some security architects integrate STRIDE with quantitative risk models developed by teams at Deloitte, McKinsey & Company, and Gartner to address concerns about subjectivity and scalability. Empirical evaluations published in venues such as ACM CCS, IEEE Security & Privacy, and NDSS compare STRIDE-based exercises to threat elicitation techniques used in DevOps workflows at enterprises like Netflix and Spotify, finding trade-offs between ease of use and coverage.

Category:Computer security models