Threat modelling
Introduction
Threat modelling is a structured approach to identifying and mitigating security risks early in the software delivery lifecycle. It helps teams design secure systems by understanding how data flows, where trust boundaries exist, and what threats may arise.
All systems MUST include threat modelling as part of their design and delivery process. This applies to ALL systems — regardless of size, sensitivity or criticality.
Threat modelling supports secure-by-design principles and helps ensure that appropriate controls are in place to protect public health data and maintain service availability.
Guidance
When to do threat modelling
Teams MUST carry out threat modelling:
- for ALL new systems
- for ALL existing systems undergoing significant change
- when integrating with new external partners or services
- after a security incident
- at least once a year for ALL systems
How to do threat modelling
Teams MUST follow a structured approach such as the OWASP Threat Modelling Process, which includes:
- Decompose the system — understand the architecture, data flows and trust boundaries
- Identify threats — use the STRIDE model to consider different types of risk
- Mitigate risks — define and implement appropriate security controls
- Validate controls — test that mitigations are effective
Threat modelling MUST be integrated into the design phase of the SDLC and MUST inform security testing and backlog planning.
Required deliverables
Each threat model MUST include the following:
- System context — including data sensitivity, user types and trust boundaries
- Data flow diagram — showing key components, data stores and trust boundaries
- STRIDE threat analysis — identifying threats for each component
- Risk assessment — rating impact and likelihood
- Security controls — mapped to threats, with gaps identified
- Security user stories — added to the backlog with acceptance criteria
- Validation plan — describing how controls will be tested
- Documentation — stored in version control and updated regularly
Details of these deliverables are provided in the Threat Modelling Appendix.
All threat models MUST be:
- Peer-reviewed within the delivery team
- Reviewed and approved by a Security Architect
- Updated within 30 days of any significant system change or new threat intelligence
Measurement
Use these indicators to assess the quality and effectiveness of threat modelling:
ID | Indicator | GREEN | AMBER | RED |
---|---|---|---|---|
TM-1 | Threat model currency | Updated within 30 days of changes or new threats | Updated within 60 days | Outdated or not maintained |
TM-2 | Required deliverables completed | ALL required deliverables present and complete | Some deliverables missing or incomplete | Deliverables missing or absent |
TM-3 | Review and assurance | Reviewed by Security Architect and peer-reviewed | Peer-reviewed only | Not reviewed |
TM-4 | Integration with development | Security stories in backlog and controls validated | Some stories or validation steps missing | No integration with delivery |
References
Published: 24 July 2025
Last updated: 7 August 2025
Page Source