Generated by GPT-5-mini| STRIDE model | |
|---|---|
| Name | STRIDE model |
| Type | Threat modeling framework |
| Developer | Microsoft Threat Modeling Team |
| Introduced | 1999 |
| Purpose | Security threat classification |
STRIDE model
The STRIDE model is a mnemonic-based threat classification framework developed to categorize security threats during system design and analysis. It is widely used in software engineering, information security, and risk assessment to guide threat identification across platforms and protocols. Practitioners integrate STRIDE with design reviews, architecture diagrams, and mitigation planning in enterprise and open-source projects.
STRIDE groups threats into discrete categories to aid systematic analysis during design and review processes. The model is often taught alongside methodologies and artifacts from Microsoft engineering practices, compared with approaches used by National Institute of Standards and Technology and referenced in curricula from Massachusetts Institute of Technology, Stanford University, and Carnegie Mellon University. Security teams from organizations such as Amazon (company), Google, Facebook, IBM, and Oracle Corporation apply STRIDE when assessing cloud services, application programming interfaces, and distributed systems. Frameworks and tools from vendors like OWASP, ISACA, SANS Institute, and ENISA commonly cross-reference STRIDE during threat modeling exercises.
STRIDE was introduced by members of the threat modeling team at Microsoft in the late 1990s and formalized in internal and external guidance as part of secure development lifecycles. Its publication coincided with contemporaneous work in threat analysis by researchers affiliated with CERT Coordination Center, MITRE Corporation, and standards bodies such as IEEE. Early adopters included engineering groups at Sun Microsystems, Intel Corporation, and research labs connected to University of California, Berkeley and University of Cambridge. Over time STRIDE was disseminated through conferences like Black Hat, DEF CON, RSA Conference, and Usenix Security Symposium, and documented in books and courses produced by authors associated with Addison-Wesley and O'Reilly Media.
STRIDE comprises categories that map common threat types to security properties; each category corresponds to a mnemonic letter used to drive checklist-based analysis. Security engineers often relate STRIDE categories to controls described in standards such as ISO/IEC 27001, PCI DSS, and guidance from National Cyber Security Centre (UK).
Practitioners associate STRIDE categories with attack patterns cataloged by MITRE ATT&CK and mitigation strategies demonstrated in case studies from Microsoft Research and academic papers from Harvard University and Princeton University. Integration with modeling languages and tools—such as those from UML, BPMN, Microsoft Threat Modeling Tool, and repositories maintained by GitHub and GitLab—facilitates mapping threats to components in architectures developed at companies like Salesforce and VMware.
The STRIDE model is applied in design reviews for web applications, mobile platforms, embedded systems, and industrial control systems. Teams at Apple Inc., Cisco Systems, Siemens, and Schneider Electric have used STRIDE-informed processes to evaluate firmware, network appliances, and operational technology. STRIDE is invoked in threat modeling exercises accompanying regulatory compliance programs tied to laws and directives such as HIPAA, GDPR, and Sarbanes–Oxley Act. In education, instructors at University of Oxford, University of Edinburgh, and Imperial College London teach STRIDE as part of courses on secure software engineering, often alongside case studies involving LinkedIn, Twitter, Uber, and Airbnb security incidents. Incident response teams from FireEye, CrowdStrike, and Kaspersky reference STRIDE when mapping observed tactics to design deficiencies.
While STRIDE is lauded for simplicity and mnemonic utility, academics and practitioners critique its scope and granularity compared to taxonomies like MITRE ATT&CK and structured methods from NIST. Critics from research groups at ETH Zurich and TU Delft have argued that STRIDE can encourage checklist thinking and may miss socio-technical threats emphasized in studies by Stanford Center for Internet and Society and Oxford Internet Institute. Some security architects integrate STRIDE with quantitative risk models developed by teams at Deloitte, McKinsey & Company, and Gartner to address concerns about subjectivity and scalability. Empirical evaluations published in venues such as ACM CCS, IEEE Security & Privacy, and NDSS compare STRIDE-based exercises to threat elicitation techniques used in DevOps workflows at enterprises like Netflix and Spotify, finding trade-offs between ease of use and coverage.
Category:Computer security models