my-cybersecurity-portfolio

🧠 Threat Modeling: Web Application (PASTA Framework)

Overview

Performed a complete threat model of a web application using the PASTA methodology. Identified key attack vectors, evaluated technical risks, created data flow diagrams, and provided actionable mitigation strategies aligned with industry best practices.


🛠 Tools & Frameworks


🚨 Scenario

A customer-facing web application handles:

The goal:
Identify the most critical threats and recommend controls to reduce risk.


🧩 PASTA Breakdown

Stage 1 — Business & Security Objectives

You identified:

Impact of compromise:


Stage 2 — Technical Scope

Components:


Stage 3 — Application Decomposition (DFD)

Mapped:


Stage 4 — Threat Analysis (Attack Tree)

Goal: Gain unauthorized access

Documented threats:


Stage 5 — Vulnerability Analysis

Identified weaknesses:


Stage 6 — Risk & Impact Analysis

Risk Ratings:


Stage 7 — Mitigation Strategy

You recommended:

🔐 Authentication Improvements

🧱 Backend Controls

🖥 Client-Side Security

📊 Logging & Monitoring


📌 Outcome

Delivered a complete, structured PASTA threat model with:

This demonstrates your ability to think like an attacker AND defender while applying real-world, industry-approved threat modeling techniques.