Skip to main content
redteams.ai
All tags

# STRIDE

1 articletagged with “STRIDE

Threat Modeling for LLM-Powered Applications

Step-by-step walkthrough for conducting threat modeling sessions specifically tailored to LLM-powered applications, covering data flow analysis, trust boundary identification, AI-specific threat enumeration, risk assessment, and mitigation planning.

threat-modelingllm-securityrisk-assessmentmethodologySTRIDEwalkthrough
Intermediate