Why Threat Modelling is Non-Negotiable in 2026
Threat modelling is the structured process of identifying, enumerating, and prioritising threats to a system before code reaches production. Unlike penetration testing — which identifies vulnerabilities after the fact — threat modelling shifts security left, embedding risk thinking into architecture and design decisions. For organisations operating in Indian regulated sectors, it is no longer a best practice; it is a regulatory mandate.
STRIDE, developed at Microsoft, remains the most widely adopted threat modelling framework because of its completeness and practical applicability. It classifies threats into six categories that together cover the full attack surface of any software system — from credential abuse to data leakage to outage scenarios. Each category maps directly to a security property that the system must preserve, making STRIDE both a diagnostic tool and a control specification framework.
The Six STRIDE Categories
- SSpoofing — Impersonating another user, service, or system to gain illegitimate access. Covered by authentication controls, MFA, and certificate pinning.
- TTampering — Maliciously modifying data at rest or in transit. Mitigated by integrity checks, signed messages, WAFs, and database activity monitoring.
- RRepudiation — Denying having performed an action due to insufficient audit trails. Addressed by immutable logging, digital signatures, and non-repudiation controls.
- IInformation Disclosure — Exposure of sensitive data to unauthorised parties. Countered by encryption in transit and at rest, access controls, and API output filtering.
- DDenial of Service — Degrading or halting system availability. Addressed by rate limiting, DDoS protection, resilient architectures, and dependency management.
- EElevation of Privilege — Gaining permissions beyond what is authorised. Mitigated by least-privilege, RBAC, IDOR protections, and IAM controls.
Indian Regulatory Context
All three major Indian financial regulators now explicitly require documented threat and risk assessments as part of system development and change management processes.
The RBI’s Threat and Risk Assessment (TRA) guidelines require banks and NBFCs to conduct structured threat assessments for all critical information systems, with documented outputs retained for audit purposes. The assessment must consider threat actors, attack vectors, and asset sensitivity — precisely what STRIDE provides.
SEBI’s Cybersecurity and Cyber Resilience Framework (CSCRF) mandates threat modelling as part of its secure SDLC requirements under controls IS.1 through IS.4. Market infrastructure institutions (MIIs), qualified stock brokers (QSBs), and registered investment advisors must embed threat assessment into every major development cycle.
The IRDAI Information Security Audit framework similarly requires insurers to document threat scenarios for customer-facing portals and policy administration systems as part of annual IS audits. STRIDE outputs serve directly as audit evidence.
Under the Digital Personal Data Protection (DPDP) Act, Section 8(1), Data Fiduciaries must implement “reasonable security safeguards.” Documented threat modelling demonstrating that technical measures were selected based on identified threats strengthens your §8(1) compliance posture and reduces regulatory exposure in the event of a breach investigation.
Why STRIDE Works for BFSI
STRIDE maps naturally to the threat landscape of banking, financial services, and insurance systems. Spoofing covers account takeover and credential stuffing — the top attack vectors against customer portals. Tampering addresses transaction manipulation and log falsification, critical concerns for payment systems and core banking. Repudiation directly addresses dispute resolution requirements in digital banking, where a customer challenging a transaction must be met with irrefutable audit evidence.
Information Disclosure covers PII and financial data leakage under both RBI data localisation and DPDP Act obligations. Denial of Service addresses business continuity risks for trading systems, payment rails, and insurance claim portals where downtime carries both financial and regulatory consequences. Elevation of Privilege covers insider threat scenarios — a category specifically highlighted in RBI’s Cyber Security Framework for Banks — where employees exploit overprivileged accounts to access customer data or authorise fraudulent transactions.
How to Use This Wizard
- Describe your system: enter the name, type, data sensitivity classification, and applicable regulatory frameworks. This takes about two minutes and contextualises all downstream risk ratings.
- Work through each of the six STRIDE categories. Select the pre-written threat scenarios that apply to your system architecture and add any custom threats specific to your technology stack or business context.
- Rate each selected threat on a 2×2 risk matrix — likelihood and impact — to compute a risk level automatically. This step takes under five minutes for most systems.
- Review the pre-suggested mitigations drawn from industry best practices, customise them to your architecture, then export a formatted PDF ready for audit evidence submission, CISO review, or architecture design records.