How ThreatKrew Works
Five simple steps from architecture to delivery. Complete threat models in minutes, not weeks.
Upload or Describe Your Architecture
Drop in a diagram, paste a description, or point ThreatKrew at your architecture components. The system ingests cloud patterns, data flows, services, trust boundaries, and integrations.
Supported Formats:
Drag & Drop Interface
Simply drag your architecture files into the browser or paste text descriptions
Automatic Parsing
Intelligent extraction of components, data flows, and trust boundaries
Validation & Preview
Review parsed architecture before analysis to ensure accuracy
AI Identifies Components, Threats & Controls
Our inference engine translates your design into components, applies STRIDE, maps real-world attack techniques, and aligns mitigations with the correct NIST 800-53 controls.
What Happens During Analysis:
STRIDE Categorization
Every component and data flow analyzed for Spoofing, Tampering, Repudiation, Information Disclosure, Denial of Service, and Elevation of Privilege threats
MITRE ATT&CK Mapping
Automatic enrichment with relevant tactics, techniques, and procedures from the MITRE ATT&CK framework
NIST Control Mapping
Threat-specific security controls mapped to NIST 800-53 and other compliance frameworks
You Review, Adjust & Approve
ThreatKrew produces a draft threat model with full transparency. You can accept, modify, or override any element. Your expertise stays in the loop.
Export & Integration Options:
What You Get:
- • Complete STRIDE threat inventory with severity ratings
- • MITRE ATT&CK technique mappings for each threat
- • NIST 800-53 control recommendations
- • Prioritized remediation roadmap
- • Architecture diagram with threat annotations
The Complete Workflow
From upload to remediation in one seamless process
Upload
Diagram or description
Analyze
STRIDE + ATT&CK + NIST
Export
Reports & integrations
Why Teams Choose ThreatKrew
Built by security architects, for security architects
Speed
Complete threat models in minutes instead of weeks. Spend time on remediation, not documentation.
Accuracy
Deterministic analysis means consistent, repeatable results. No AI hallucinations or missed threats.
Standards
Full STRIDE coverage with MITRE ATT&CK and NIST mappings. Compliance-ready from day one.
Ready to Modernise Threat Modelling?
See ThreatKrew in action and learn how we deliver complete threat models in minutes, not weeks.