{"id":65958,"date":"2026-05-06T11:45:40","date_gmt":"2026-05-06T09:45:40","guid":{"rendered":"https:\/\/www.usd.de\/?page_id=65958"},"modified":"2026-05-06T12:02:02","modified_gmt":"2026-05-06T10:02:02","slug":"threat-modeling","status":"publish","type":"page","link":"https:\/\/www.usd.de\/en\/security-consulting\/threat-modeling\/","title":{"rendered":"Threat Modeling"},"content":{"rendered":"<p>[et_pb_section fb_built=\"1\" _builder_version=\"4.16\" _module_preset=\"default\" custom_padding=\"0px||0px||true|false\" locked=\"off\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_row _builder_version=\"4.16\" _module_preset=\"default\" width=\"100%\" custom_padding=\"0px||||false|false\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_column type=\"4_4\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_text _builder_version=\"4.27.6\" _module_preset=\"default\" text_text_color=\"#FFFFFF\" text_font_size=\"30px\" text_line_height=\"1.2em\" header_font=\"Roboto||||||||\" header_text_color=\"#F07F1D\" header_font_size=\"50px\" background_color=\"rgba(99,99,99,0.47)\" background_image=\"https:\/\/www.usd.de\/wp-content\/uploads\/usd-header-tread-modeling.jpg\" background_blend=\"multiply\" custom_margin=\"-25px||0px||false|false\" custom_padding=\"95px||60px||false|false\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"]<\/p>\n<h1 style=\"text-align: center;line-height: 120%;font-weight: 400\">Threat Modeling<\/h1>\n<p style=\"text-align: center;line-height: 130%\"><span>Identify risks early. Meet compliance <br \/>requirements with confidence.<\/span><\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=\"4.27.4\" _module_preset=\"default\" custom_padding=\"0px||19px||false|false\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_column type=\"4_4\" _builder_version=\"4.24.1\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_text _builder_version=\"4.27.6\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"]<\/p>\n<p>Complex IT landscapes and growing regulatory requirements are increasing the pressure on organizations to identify security risks early and in a traceable manner, and to make well\u2011founded decisions. Threat Modeling offers an effective approach to make potential attack scenarios and risks visible at the architecture and system level.<\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=\"2_5,3_5\" _builder_version=\"4.24.1\" _module_preset=\"default\" custom_padding=\"0px|||||\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_column type=\"2_5\" _builder_version=\"4.24.1\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_image src=\"https:\/\/www.usd.de\/wp-content\/uploads\/usd-kachel-thread-modeling.jpg\" title_text=\"usd-kachel-thread-modeling\" _builder_version=\"4.27.6\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][\/et_pb_image][\/et_pb_column][et_pb_column type=\"3_5\" _builder_version=\"4.24.1\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_text _builder_version=\"4.27.6\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"]Threat Modeling complements existing security measures, such as pentests, but does not replace them. It provides a structured basis for selecting technical and organizational measures in a targeted and effective way.[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=\"4.27.6\" _module_preset=\"default\" custom_margin=\"||0px||false|false\" custom_padding=\"30px||1%||false|false\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_column type=\"4_4\" _builder_version=\"4.24.1\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_text _builder_version=\"4.27.6\" _module_preset=\"default\" custom_padding=\"||0px||false|false\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"]<\/p>\n<h2>Threat Modeling as a Building Block of Modern Compliance Requirements<\/h2>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=\"4.24.1\" _module_preset=\"default\" custom_padding=\"0px||0px|||\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_column type=\"4_4\" _builder_version=\"4.24.1\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_text _builder_version=\"4.27.6\" _module_preset=\"default\" custom_padding=\"||19px||false|false\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"]Regulatory requirements increasingly demand preventive, consistent, and traceable risk management throughout the entire lifecycle of systems and products. Threat Modeling supports organizations in meeting these requirements in a structured way. [\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=\"3_4,1_4\" _builder_version=\"4.27.6\" _module_preset=\"default\" custom_padding=\"17px||2%||false|false\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_column type=\"3_4\" _builder_version=\"4.24.1\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_text _builder_version=\"4.27.6\" _module_preset=\"default\" custom_margin=\"0px||0px||false|false\" custom_padding=\"0px||||false|false\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"]<\/p>\n<h4><strong>NIS\u20112: Preventive Cyber Risk Management<\/strong><\/h4>\n<p>[\/et_pb_text][et_pb_text _builder_version=\"4.27.6\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"]<\/p>\n<p>The NIS 2 Directive requires the systematic identification and assessment of cyber risks.<span style=\"font-size: 16px\">Threat Modeling helps analyze potential attack paths already at the architecture and design level.<\/span><\/p>\n<p>[\/et_pb_text][et_pb_text _builder_version=\"4.27.6\" _module_preset=\"default\" custom_margin=\"0px||0px||false|false\" custom_padding=\"2%||0px||false|false\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"]<\/p>\n<h4><strong>DORA: Secure by Design and Resilience<\/strong><\/h4>\n<p>[\/et_pb_text][et_pb_text _builder_version=\"4.27.6\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"]<\/p>\n<p>DORA requires the early consideration of security risks in system design.<span style=\"font-size: 16px\">Threat Modeling analyzes realistic attack scenarios and supports the development of digital resilience.<\/span><\/p>\n<p>[\/et_pb_text][et_pb_text _builder_version=\"4.27.6\" _module_preset=\"default\" custom_margin=\"0px||0px||false|false\" custom_padding=\"2%||0px||false|false\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"]<\/p>\n<h4><strong>Cyber Resilience Act (CRA): Risk assessment across the entire lifecycle<\/strong><\/h4>\n<p>[\/et_pb_text][et_pb_text _builder_version=\"4.27.6\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"]<\/p>\n<p>The Cyber Resilience Act requires continuous risk assessments.<span style=\"font-size: 16px\">Threat Modeling provides a consistent and traceable methodological foundation for this assessment.<\/span><\/p>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=\"1_4\" _builder_version=\"4.24.1\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_image src=\"https:\/\/www.usd.de\/wp-content\/uploads\/Thread-Modeling-Services-Compliance-Anforderungen.svg\" title_text=\"Thread-Modeling-Services-Compliance-Anforderungen\" disabled_on=\"on|on|off\" _builder_version=\"4.27.6\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][\/et_pb_image][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=\"4.27.6\" _module_preset=\"default\" custom_padding=\"6%||0px||false|false\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_column type=\"4_4\" _builder_version=\"4.24.1\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_text _builder_version=\"4.27.6\" _module_preset=\"default\" custom_margin=\"0px||||false|false\" custom_padding=\"0px||||false|false\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"]<\/p>\n<h2>Other Reasons Why Threat Modeling Is Gaining Importance<\/h2>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=\"4.27.6\" _module_preset=\"default\" custom_margin=\"0px||||false|false\" custom_padding=\"2%||2%||false|false\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_column type=\"4_4\" _builder_version=\"4.17.4\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_accordion open_toggle_background_color=\"#FFFFFF\" closed_toggle_background_color=\"#FFFFFF\" toggle_icon=\"&#x43;||divi||400\" icon_color=\"#F07F1D\" use_icon_font_size=\"on\" icon_font_size=\"23px\" _builder_version=\"4.27.6\" _module_preset=\"default\" body_font=\"|300|||||||\" body_font_size=\"16px\" custom_margin=\"4px|0px|-1px|0px|false|true\" border_radii=\"on|5px|5px|5px|5px\" border_color_all=\"#F6F6F6\" box_shadow_style=\"preset1\" box_shadow_spread=\"-11px\" box_shadow_color=\"rgba(0,0,0,0.22)\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_accordion_item title=\"Ihr Titel\" open=\"on\" _builder_version=\"4.16\" _module_preset=\"default\" custom_css_main_element=\"display: none;\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"]<\/p>\n<p>Your content goes here. Edit or remove this text inline or in the module Content settings. You can also style every aspect of this content in the module Design settings and even apply custom CSS to this text in the module Advanced settings.<\/p>\n<p>[\/et_pb_accordion_item][et_pb_accordion_item title=\"Increasing System and Architecture Complexity\" closed_toggle_text_color=\"#3C3C3C\" icon_color=\"#707070\" toggle_icon=\"&#x33;||divi||400\" _builder_version=\"4.27.6\" _module_preset=\"default\" border_radii=\"on|5px|5px|5px|5px\" global_colors_info=\"{}\" toggle_level=\"h4\" toggle_font=\"|300|||||||\" closed_toggle_font=\"|300|||||||\" closed_toggle_font_size=\"18px\" toggle_text_color__hover_enabled=\"on|hover\" toggle_text_color__hover=\"#F07F1D\" open_toggle_text_color__hover_enabled=\"on|hover\" open_toggle_text_color__hover=\"#F07F1D\" theme_builder_area=\"post_content\" open=\"off\"]<\/p>\n<p>Networked, partly cloud-based IT landscapes make it difficult to maintain an overview of security risks. Threat Modeling helps analyze complex architectures in a structured way and makes security\u2011relevant dependencies visible at an early stage. <\/p>\n<p>[\/et_pb_accordion_item][et_pb_accordion_item title=\"Increasing Professionalization of Attackers\" closed_toggle_text_color=\"#3C3C3C\" icon_color=\"#707070\" toggle_icon=\"&#x33;||divi||400\" _builder_version=\"4.27.6\" _module_preset=\"default\" border_radii=\"on|5px|5px|5px|5px\" global_colors_info=\"{}\" toggle_level=\"h4\" toggle_font=\"|300|||||||\" closed_toggle_font=\"|300|||||||\" closed_toggle_font_size=\"18px\" toggle_text_color__hover_enabled=\"on|hover\" toggle_text_color__hover=\"#F07F1D\" open_toggle_text_color__hover_enabled=\"on|hover\" open_toggle_text_color__hover=\"#F07F1D\" theme_builder_area=\"post_content\" open=\"off\"]<\/p>\n<p>Modern tools and AI enable attackers to exploit vulnerabilities, misconfigurations and architectural flaws in an increasingly targeted manner. Threat Modeling examines architectures and design decisions from an attacker's perspective and derives realistic attack scenarios.  <\/p>\n<p>[\/et_pb_accordion_item][et_pb_accordion_item title=\"Architecture and Design Decisions as a Key Lever\" closed_toggle_text_color=\"#3C3C3C\" icon_color=\"#707070\" toggle_icon=\"&#x33;||divi||400\" _builder_version=\"4.27.6\" _module_preset=\"default\" border_radii=\"on|5px|5px|5px|5px\" global_colors_info=\"{}\" toggle_level=\"h4\" toggle_font=\"|300|||||||\" closed_toggle_font=\"|300|||||||\" closed_toggle_font_size=\"18px\" toggle_text_color__hover_enabled=\"on|hover\" toggle_text_color__hover=\"#F07F1D\" open_toggle_text_color__hover_enabled=\"on|hover\" open_toggle_text_color__hover=\"#F07F1D\" theme_builder_area=\"post_content\" open=\"off\"]<\/p>\n<p>Risks often arise in the early phases. Threat Modeling helps identify these risks early and address them systematically in architecture and design decisions. <\/p>\n<p>[\/et_pb_accordion_item][\/et_pb_accordion][\/et_pb_column][\/et_pb_row][et_pb_row disabled_on=\"on|on|off\" _builder_version=\"4.27.6\" _module_preset=\"default\" custom_margin=\"5%||||false|false\" custom_padding=\"0px||0px|||\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_column type=\"4_4\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_text _builder_version=\"4.27.6\" _module_preset=\"default\" custom_margin=\"||0px||false|false\" custom_padding=\"9px||0px||false|false\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"]<\/p>\n<h2><span data-contrast=\"none\" xml:lang=\"DE-DE\" lang=\"DE-DE\" class=\"TextRun SCXW117351119 BCX0\"><span class=\"NormalTextRun CommentStart CommentHighlightPipeClicked CommentHighlightClicked CommentImportant SCXW117351119 BCX0\" data-ccp-parastyle=\"heading 2\">Why usd AG Is Your First Choice for Threat Modeling<\/span><span class=\"NormalTextRun CommentHighlightClicked CommentImportant SCXW117351119 BCX0\" data-ccp-parastyle=\"heading 2\"><span>\u00a0<\/span><\/span><\/span><span class=\"EOP CommentHighlightPipeClicked SCXW117351119 BCX0\" data-ccp-props=\"{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335559738&quot;:160,&quot;335559739&quot;:80}\">\u00a0<\/span><\/h2>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row disabled_on=\"on|on|off\" _builder_version=\"4.27.6\" _module_preset=\"default\" custom_margin=\"0px|auto||auto|false|false\" custom_padding=\"0px||21px|||\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_column type=\"4_4\" _builder_version=\"4.18.0\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_slider show_content_on_mobile=\"off\" disabled_on=\"off|off|off\" _builder_version=\"4.27.6\" _module_preset=\"default\" body_text_align=\"center\" background_color=\"RGBA(0,0,0,0)\" background_image=\"https:\/\/www.usd.de\/wp-content\/uploads\/Slider-Thread-Modeling-USP_BG.jpg\" background_size=\"contain\" custom_padding=\"60px||60px||true|false\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_slide _builder_version=\"4.27.6\" _module_preset=\"default\" header_level=\"h2\" body_text_align=\"left\" background_color=\"RGBA(0,0,0,0)\" background_enable_color=\"on\" text_orientation=\"left\" custom_padding=\"10%|||0px|false|false\" global_colors_info=\"{}\" sticky_transition=\"on\" theme_builder_area=\"post_content\"]<\/p>\n<h3 style=\"color: white;font-size: 140%;font-weight: 400;line-height: 140%;text-align: left\">Many years of experience in highly regulated industries<\/h3>\n<h3 style=\"color: white;font-size: 130%;font-weight: 300;line-height: 140%;text-align: left\">For over 30 years, we have been supporting complex<br \/>international organizations in building and continuously <\/br> developing effective cyber security capabilities.<\/h3>\n<p>[\/et_pb_slide][et_pb_slide _builder_version=\"4.27.6\" _module_preset=\"default\" header_level=\"h2\" body_text_align=\"left\" background_color=\"RGBA(0,0,0,0)\" background_enable_color=\"on\" text_orientation=\"left\" custom_padding=\"10%|||0px|false|false\" global_colors_info=\"{}\" sticky_transition=\"on\" theme_builder_area=\"post_content\"]<\/p>\n<h3 style=\"color: white;font-size: 140%;font-weight: 400;line-height: 140%;text-align: left\">Holistic cyber security expertise from strategy<br \/>to architecture<\/h3>\n<h3 style=\"color: white;font-size: 130%;font-weight: 300;line-height: 140%;text-align: left\">Our Threat Modeling team draws on experience and<br \/>best practices from extensive projects across all<br \/>usd business units \u2013 from strategic security consulting<br \/>to in-depth security analysis.<\/h3>\n<p>[\/et_pb_slide][et_pb_slide _builder_version=\"4.27.6\" _module_preset=\"default\" header_level=\"h2\" body_text_align=\"left\" background_color=\"RGBA(0,0,0,0)\" background_enable_color=\"on\" text_orientation=\"left\" custom_padding=\"10%|||0px|false|false\" global_colors_info=\"{}\" sticky_transition=\"on\" theme_builder_area=\"post_content\"]<\/p>\n<h3 style=\"color: white;font-size: 140%;font-weight: 400;line-height: 140%;text-align: left\">Threat Modeling for verifiable decisions<\/h3>\n<h3 style=\"color: white;font-size: 130%;font-weight: 300;line-height: 140%;text-align: left\">Our work results in a verifiable decision-making basis<br \/>\nin which risks and attack scenarios are documented in<br \/>\na clear and traceable manner \u2013 for relevant<br \/>\nbusiness units, management and auditors.<\/h3>\n<p>[\/et_pb_slide][et_pb_slide _builder_version=\"4.27.6\" _module_preset=\"default\" header_level=\"h2\" body_text_align=\"left\" background_color=\"RGBA(0,0,0,0)\" background_enable_color=\"on\" text_orientation=\"left\" custom_padding=\"10%|||0px|false|false\" global_colors_info=\"{}\" sticky_transition=\"on\" theme_builder_area=\"post_content\"]<\/p>\n<h3 style=\"color: white;font-size: 140%;font-weight: 400;line-height: 140%;text-align: left\">Pragmatic, risk-oriented Threat Modeling approach<\/h3>\n<h3 style=\"color: white;font-size: 130%;font-weight: 300;line-height: 140%;text-align: left\">Our Threat Modeling approaches are methodologically<br \/>\nsound, scalable, and practical and can be integrated<br \/>\nseamlessly into existing structures. <\/h3>\n<p>[\/et_pb_slide][et_pb_slide _builder_version=\"4.27.6\" _module_preset=\"default\" header_level=\"h2\" body_text_align=\"left\" background_color=\"RGBA(0,0,0,0)\" background_enable_color=\"on\" text_orientation=\"left\" custom_padding=\"10%|||0px|false|false\" global_colors_info=\"{}\" sticky_transition=\"on\" theme_builder_area=\"post_content\"]<\/p>\n<h3 style=\"color: white;font-size: 140%;font-weight: 400;line-height: 140%;text-align: left\">Enablement as the key to sustainable<br \/>\nThreat Modeling <\/h3>\n<h3 style=\"color: white;font-size: 130%;font-weight: 300;line-height: 140%;text-align: left\">Through knowledge transfer, clear standards, and<br \/>\nquality assurance, we enable organizations to embed<br \/>\nThreat Modeling into their operations in a sustainable way.  <\/h3>\n<p>[\/et_pb_slide][\/et_pb_slider][\/et_pb_column][\/et_pb_row][et_pb_row disabled_on=\"off|off|on\" _builder_version=\"4.27.6\" _module_preset=\"default\" custom_padding=\"5%||5%||true|false\" hover_enabled=\"0\" global_colors_info=\"{}\" theme_builder_area=\"post_content\" sticky_enabled=\"0\"][et_pb_column type=\"4_4\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_text _builder_version=\"4.27.6\" _module_preset=\"default\" custom_margin=\"||0px||false|false\" custom_padding=\"9px||0px||false|false\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"]<\/p>\n<h2>Why usd AG Is Your First Choice for Threat Modeling<\/h2>\n<p>[\/et_pb_text][et_pb_slider _builder_version=\"4.27.6\" _module_preset=\"default\" background_color=\"RGBA(255,255,255,0)\" custom_padding=\"7%||7%||true|false\" hover_enabled=\"0\" global_colors_info=\"{}\" theme_builder_area=\"post_content\" sticky_enabled=\"0\"][et_pb_slide _builder_version=\"4.27.6\" _module_preset=\"default\" global_colors_info=\"{}\" sticky_transition=\"on\" theme_builder_area=\"post_content\"]<\/p>\n<h3 style=\"font-size: 120%;font-weight: 400;line-height: 140%;text-align: left\">Many years of experience in highly regulated industries<\/h3>\n<h3 style=\"font-size: 120%;font-weight: 300;line-height: 140%;text-align: left\">For over 30 years, we have been supporting complex international organizations in building and continuously developing effective cybersecurity capabilities.<\/h3>\n<p>[\/et_pb_slide][et_pb_slide _builder_version=\"4.27.6\" _module_preset=\"default\" global_colors_info=\"{}\" sticky_transition=\"on\" theme_builder_area=\"post_content\"]<\/p>\n<h3 style=\"font-size: 120%;font-weight: 400;line-height: 140%;text-align: left\">Holistic cyber security expertise from strategy to architecture<\/h3>\n<h3 style=\"font-size: 120%;font-weight: 300;line-height: 140%;text-align: left\">Our Threat Modeling team draws on experience and best practices from extensive projects across all usd business units \u2013 from strategic security consulting to in-depth security analysis.<\/h3>\n<p>[\/et_pb_slide][et_pb_slide _builder_version=\"4.27.6\" _module_preset=\"default\" global_colors_info=\"{}\" sticky_transition=\"on\" theme_builder_area=\"post_content\"]<\/p>\n<h3 style=\"font-size: 120%;font-weight: 400;line-height: 140%;text-align: left\">Threat Modeling for verifiable decisions<\/h3>\n<h3 style=\"font-size: 120%;font-weight: 300;line-height: 140%;text-align: left\">Our work results in a verifiable decision-making basis in which risks and attack scenarios are documented in a clear and traceable manner \u2013 for relevant business units, management and auditors.<\/h3>\n<p>[\/et_pb_slide][et_pb_slide _builder_version=\"4.27.6\" _module_preset=\"default\" global_colors_info=\"{}\" sticky_transition=\"on\" theme_builder_area=\"post_content\"]<\/p>\n<h3 style=\"font-size: 120%;font-weight: 400;line-height: 140%;text-align: left\">Pragmatic, risk-oriented Threat Modeling approach<\/h3>\n<h3 style=\"font-size: 120%;font-weight: 300;line-height: 140%;text-align: left\">Our Threat Modeling approaches are methodologically sound, scalable, and practical and can be integrated seamlessly into existing structures.<\/h3>\n<p>[\/et_pb_slide][et_pb_slide _builder_version=\"4.27.6\" _module_preset=\"default\" global_colors_info=\"{}\" sticky_transition=\"on\" theme_builder_area=\"post_content\"]<\/p>\n<h3 style=\"font-size: 120%;font-weight: 400;line-height: 140%;text-align: left\">Enablement as the key to sustainable Threat Modeling<\/h3>\n<h3 style=\"font-size: 120%;font-weight: 300;line-height: 140%;text-align: left\">Through knowledge transfer, clear standards and quality assurance, we enable organizations to embed Threat Modeling into their operations in a sustainable way.<\/h3>\n<p>[\/et_pb_slide][\/et_pb_slider][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=\"4.27.6\" _module_preset=\"default\" custom_margin=\"2%||||false|false\" custom_padding=\"0px||19px||false|false\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_column type=\"4_4\" _builder_version=\"4.24.1\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_text _builder_version=\"4.27.6\" _module_preset=\"default\" custom_margin=\"0px||||false|false\" custom_padding=\"0px||||false|false\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"]<\/p>\n<h2>Introduction and Establishment of Threat Modeling in Organizations<\/h2>\n<p>[\/et_pb_text][et_pb_text _builder_version=\"4.27.6\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"]Depending on the level of maturity, we support organizations both  in both building comprehensive Threat Modeling approaches from the ground up and implementing and embedding existing ones.<\/p>\n<p>Our methodological approach to the introduction and establishment of Threat Modeling is based on established methods and frameworks such as STRIDE and is tailored to the specific conditions of your organization. Implementation is carried out in close collaboration with your teams, either remotely or on\u2011site, depending on the phase and context.<\/p>\n<p>The introduction of Threat Modeling follows a structured, step\u2011by\u2011step approach:[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=\"1_4,1_4,1_4,1_4\" _builder_version=\"4.27.6\" _module_preset=\"default\" custom_margin=\"||0px||false|false\" custom_padding=\"||0px||false|false\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_column type=\"1_4\" _builder_version=\"4.27.6\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_image src=\"https:\/\/www.usd.de\/wp-content\/uploads\/einfuehrung-thread-modeling-1.svg\" title_text=\"einfuehrung-thread-modeling-1\" _builder_version=\"4.27.6\" _module_preset=\"default\" width=\"50%\" width_tablet=\"35%\" width_phone=\"30%\" width_last_edited=\"on|phone\" module_alignment=\"center\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][\/et_pb_image][et_pb_text _builder_version=\"4.27.6\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"]<\/p>\n<p style=\"text-align: center\"><strong>Step 1<\/strong><br \/>Scoping &amp; analysis of the initial situation<\/p>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=\"1_4\" _builder_version=\"4.27.6\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_image src=\"https:\/\/www.usd.de\/wp-content\/uploads\/einfuehrung-thread-modeling-2.svg\" title_text=\"einfuehrung-thread-modeling-2\" _builder_version=\"4.27.6\" _module_preset=\"default\" width=\"50%\" width_tablet=\"35%\" width_phone=\"30%\" width_last_edited=\"on|phone\" module_alignment=\"center\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][\/et_pb_image][et_pb_text _builder_version=\"4.27.6\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"]<\/p>\n<p style=\"text-align: center\"><strong>Step 2<\/strong><br \/>Threat Modeling Design<\/p>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=\"1_4\" _builder_version=\"4.27.6\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_image src=\"https:\/\/www.usd.de\/wp-content\/uploads\/einfuehrung-thread-modeling-3.svg\" title_text=\"einfuehrung-thread-modeling-3\" _builder_version=\"4.27.6\" _module_preset=\"default\" width=\"50%\" width_tablet=\"35%\" width_phone=\"30%\" width_last_edited=\"on|phone\" module_alignment=\"center\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][\/et_pb_image][et_pb_text _builder_version=\"4.27.6\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"]<\/p>\n<p style=\"text-align: center\"><strong>Step 3<\/strong><br \/>Embedding in processes and governance<\/p>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=\"1_4\" _builder_version=\"4.27.6\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_image src=\"https:\/\/www.usd.de\/wp-content\/uploads\/einfuehrung-thread-modeling-4.svg\" title_text=\"einfuehrung-thread-modeling-4\" _builder_version=\"4.27.6\" _module_preset=\"default\" width=\"50%\" width_tablet=\"35%\" width_phone=\"30%\" width_last_edited=\"on|phone\" module_alignment=\"center\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][\/et_pb_image][et_pb_text _builder_version=\"4.27.6\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"]<\/p>\n<p style=\"text-align: center\"><strong>Step 4<\/strong><br \/>Operationalization through templates and guidelines<\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=\"1_4,1_4,1_4,1_4\" _builder_version=\"4.27.6\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_column type=\"1_4\" _builder_version=\"4.27.6\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_image src=\"https:\/\/www.usd.de\/wp-content\/uploads\/einfuehrung-thread-modeling-5.svg\" title_text=\"einfuehrung-thread-modeling-5\" _builder_version=\"4.27.6\" _module_preset=\"default\" width=\"50%\" width_tablet=\"35%\" width_phone=\"30%\" width_last_edited=\"on|phone\" module_alignment=\"center\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][\/et_pb_image][et_pb_text _builder_version=\"4.27.6\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"]<\/p>\n<p style=\"text-align: center\"><strong>Step 5<\/strong><br \/>Pilot phase and initial application<\/p>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=\"1_4\" _builder_version=\"4.27.6\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_image src=\"https:\/\/www.usd.de\/wp-content\/uploads\/einfuehrung-thread-modeling-6.svg\" title_text=\"einfuehrung-thread-modeling-6\" _builder_version=\"4.27.6\" _module_preset=\"default\" width=\"50%\" width_tablet=\"35%\" width_phone=\"30%\" width_last_edited=\"on|phone\" module_alignment=\"center\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][\/et_pb_image][et_pb_text _builder_version=\"4.27.6\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"]<\/p>\n<p style=\"text-align: center\"><strong>Step 6<\/strong><br \/>Enablement<\/p>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=\"1_4\" _builder_version=\"4.27.6\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_image src=\"https:\/\/www.usd.de\/wp-content\/uploads\/einfuehrung-thread-modeling-7.svg\" title_text=\"einfuehrung-thread-modeling-7\" _builder_version=\"4.27.6\" _module_preset=\"default\" width=\"50%\" width_tablet=\"35%\" width_phone=\"30%\" width_last_edited=\"on|phone\" module_alignment=\"center\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][\/et_pb_image][et_pb_text _builder_version=\"4.27.6\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"]<\/p>\n<p style=\"text-align: center\"><strong>Step 7<\/strong><br \/>Transition into regular operations<\/p>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=\"1_4\" _builder_version=\"4.27.6\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=\"4.27.6\" _module_preset=\"default\" custom_margin=\"2%||||false|false\" custom_padding=\"17px||19px|||\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_column type=\"4_4\" _builder_version=\"4.24.1\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_text _builder_version=\"4.27.6\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"]<\/p>\n<h2>Even After Threat Modeling at Your Side<\/h2>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=\"4.27.4\" _module_preset=\"default\" custom_padding=\"0px||19px||false|false\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_column type=\"4_4\" _builder_version=\"4.24.1\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_text _builder_version=\"4.27.6\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"]<\/p>\n<p>Depending on your needs, we support you beyond the methodological and organizational introduction of Threat Modeling with further consulting services and security analyses. Our security experts build on the insights gained from Threat Modeling.<\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=\"1_2,1_2\" _builder_version=\"4.27.6\" _module_preset=\"default\" background_enable_color=\"off\" custom_padding=\"16px|||||\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_column type=\"1_2\" _builder_version=\"4.27.6\" _module_preset=\"default\" background_color=\"RGBA(255,255,255,0)\" background_image=\"https:\/\/www.usd.de\/wp-content\/uploads\/usd-header-tread-modeling.jpg\" background_blend=\"multiply\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_text _builder_version=\"4.27.6\" _module_preset=\"default\" custom_margin=\"28px||0px||false|false\" custom_padding=\"15px||0px||false|false\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"]<\/p>\n<h3 style=\"text-align: center\"><span style=\"color: #ffffff\">Deepen &amp; Develop the<br \/>Threat Modeling Approach <\/span><\/h3>\n<p>&nbsp;<\/p>\n<p>[\/et_pb_text][et_pb_text _builder_version=\"4.27.6\" _module_preset=\"default\" custom_padding=\"||5%||false|false\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"]<\/p>\n<p style=\"text-align: center\"><span style=\"color: #ffffff\">E.g. workshops, targeted coaching or expansion to other systems and applications.<\/span><\/p>\n<p>[\/et_pb_text][et_pb_button button_url=\"https:\/\/www.usd.de\/en\/contact-form-security-consulting\/\" button_text=\"Contact us \" button_alignment=\"center\" _builder_version=\"4.27.6\" _module_preset=\"7d5eca5e-7ccf-4359-a023-e8404a31180a\" button_bg_use_color_gradient=\"on\" button_bg_color_gradient_direction=\"153deg\" button_bg_color_gradient_stops=\"#f07f1d 0%|#f29c1d 99%\" custom_margin=\"||30px||false|false\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][\/et_pb_button][\/et_pb_column][et_pb_column type=\"1_2\" _builder_version=\"4.27.6\" _module_preset=\"default\" background_color=\"rgba(0,0,0,0.45)\" background_image=\"https:\/\/www.usd.de\/wp-content\/uploads\/usd-kachel-thread-modeling-tech.jpg\" background_blend=\"multiply\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_text _builder_version=\"4.27.6\" _module_preset=\"default\" custom_margin=\"28px||0px||false|false\" custom_padding=\"15px||0px||false|false\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"]<\/p>\n<h3 style=\"text-align: center\"><span style=\"color: #ffffff\">Ensure the Quality and Consistency of Threat Modeling<\/span><\/h3>\n<p>&nbsp;<\/p>\n<p>[\/et_pb_text][et_pb_text _builder_version=\"4.27.6\" _module_preset=\"default\" custom_padding=\"||5%||false|false\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"]<\/p>\n<p style=\"text-align: center\"><span style=\"color: #ffffff\">E.g. reviews and technical support for your own Threat Modeling activities.<\/span><\/p>\n<p>[\/et_pb_text][et_pb_button button_url=\"https:\/\/www.usd.de\/en\/contact-form-security-consulting\/\" button_text=\"Contact us \" button_alignment=\"center\" _builder_version=\"4.27.6\" _module_preset=\"7d5eca5e-7ccf-4359-a023-e8404a31180a\" button_bg_use_color_gradient=\"on\" button_bg_color_gradient_direction=\"153deg\" button_bg_color_gradient_stops=\"#f07f1d 0%|#f29c1d 99%\" custom_margin=\"||30px||false|false\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][\/et_pb_button][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=\"1_2,1_2\" _builder_version=\"4.27.6\" _module_preset=\"default\" background_enable_color=\"off\" custom_padding=\"16px||10%||false|false\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_column type=\"1_2\" _builder_version=\"4.27.6\" _module_preset=\"default\" background_color=\"rgba(0,0,0,0.63)\" background_image=\"https:\/\/www.usd.de\/wp-content\/uploads\/usd-herolab-pentest-kachel-leistung.jpg\" background_blend=\"multiply\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_text _builder_version=\"4.27.6\" _module_preset=\"default\" custom_margin=\"28px||0px||false|false\" custom_padding=\"15px||0px||false|false\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"]<\/p>\n<h3 style=\"text-align: center\"><span style=\"color: #ffffff\">Adding Security Analyses<br \/>\nin a Targeted Manner<\/span><\/h3>\n<p>&nbsp;[\/et_pb_text][et_pb_text _builder_version=\"4.27.6\" _module_preset=\"default\" custom_padding=\"||5%||false|false\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"]<\/p>\n<p style=\"text-align: center\"><span style=\"color: #ffffff\">E.g. security scans, pentests or red team assessments.<\/span><\/p>\n<p>[\/et_pb_text][et_pb_button button_url=\"https:\/\/www.usd.de\/en\/security-analysis-pentests\/\" button_text=\"Learn more\" button_alignment=\"center\" _builder_version=\"4.27.6\" _module_preset=\"7d5eca5e-7ccf-4359-a023-e8404a31180a\" button_bg_use_color_gradient=\"on\" button_bg_color_gradient_direction=\"153deg\" button_bg_color_gradient_stops=\"#f07f1d 0%|#f29c1d 99%\" custom_margin=\"||30px||false|false\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][\/et_pb_button][\/et_pb_column][et_pb_column type=\"1_2\" _builder_version=\"4.27.6\" _module_preset=\"default\" background_color=\"rgba(0,0,0,0.64)\" background_image=\"https:\/\/www.usd.de\/wp-content\/uploads\/usd-security-audits-kachel-swift.jpg\" background_blend=\"multiply\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_text _builder_version=\"4.27.6\" _module_preset=\"default\" custom_margin=\"28px||0px||false|false\" custom_padding=\"15px||0px||false|false\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"]<\/p>\n<h3 style=\"text-align: center\"><span style=\"color: #ffffff\">Embed Insights into Governance and Security Organization<\/span><\/h3>\n<p>&nbsp;<\/p>\n<p>[\/et_pb_text][et_pb_text _builder_version=\"4.27.6\" _module_preset=\"default\" custom_padding=\"||5%||false|false\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"]<\/p>\n<p style=\"text-align: center\"><span style=\"color: #ffffff\">E.g. targeted further development of your ISMS or support for related security topics. <\/span><\/p>\n<p>[\/et_pb_text][et_pb_button button_url=\"https:\/\/www.usd.de\/en\/services\/\" button_text=\"Learn more\" button_alignment=\"center\" _builder_version=\"4.27.6\" _module_preset=\"7d5eca5e-7ccf-4359-a023-e8404a31180a\" button_bg_use_color_gradient=\"on\" button_bg_color_gradient_direction=\"153deg\" button_bg_color_gradient_stops=\"#f07f1d 0%|#f29c1d 99%\" custom_margin=\"||30px||false|false\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][\/et_pb_button][\/et_pb_column][\/et_pb_row][\/et_pb_section]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Threat Modeling Identify risks early. Meet compliance requirements with confidence.Complex IT landscapes and growing regulatory requirements are increasing the pressure on organizations to identify security risks early and in a traceable manner, and to make well\u2011founded decisions. Threat Modeling offers an effective approach to make potential attack scenarios and risks visible at the architecture and [&hellip;]<\/p>\n","protected":false},"author":92,"featured_media":0,"parent":11659,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_et_pb_use_builder":"on","_et_pb_old_content":"","_et_gb_content_width":"","inline_featured_image":false,"footnotes":""},"class_list":["post-65958","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/www.usd.de\/en\/wp-json\/wp\/v2\/pages\/65958","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.usd.de\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.usd.de\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.usd.de\/en\/wp-json\/wp\/v2\/users\/92"}],"replies":[{"embeddable":true,"href":"https:\/\/www.usd.de\/en\/wp-json\/wp\/v2\/comments?post=65958"}],"version-history":[{"count":5,"href":"https:\/\/www.usd.de\/en\/wp-json\/wp\/v2\/pages\/65958\/revisions"}],"predecessor-version":[{"id":66046,"href":"https:\/\/www.usd.de\/en\/wp-json\/wp\/v2\/pages\/65958\/revisions\/66046"}],"up":[{"embeddable":true,"href":"https:\/\/www.usd.de\/en\/wp-json\/wp\/v2\/pages\/11659"}],"wp:attachment":[{"href":"https:\/\/www.usd.de\/en\/wp-json\/wp\/v2\/media?parent=65958"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}