Episode 19 — Threat Modeling Frameworks in Practice: ATT&CK, CAPEC, STRIDE, Kill Chain, OWASP

In this episode, we take threat modeling from general reasoning about attackers and turn it into a practical habit by using well-known frameworks as thinking aids, not as trivia to memorize. Beginners often hear framework names and assume the goal is to recall definitions on command, but the real value is that these frameworks give you structured ways to describe attacks, identify likely weaknesses, and map defenses to what attackers actually do. SecurityX includes these frameworks because they help security teams communicate clearly and consistently across many scenarios. If one person describes an attack as a phishing incident and another describes it as credential access and lateral movement, a shared framework helps those descriptions line up. Frameworks also keep you from missing steps in an attack sequence, because real attacks are usually multi-stage, and defenders lose when they focus on just one stage. We are going to look at a set of common frameworks, explain what each is best at, and show how you can use them together without getting lost. The aim is to make you comfortable enough that when an exam scenario hints at attacker behavior, you can use a framework lens to choose controls and responses that match the stage of attack.

Before we continue, a quick note: this audio course is a companion to our course companion books. The first book is about the exam and provides detailed information on how to pass it best. The second book is a Kindle-only eBook that contains 1,000 flashcards that can be used on your mobile device or Kindle. Check them both out at Cyber Author dot me, in the Bare Metal Study Guides Series.

Start with the practical reason frameworks exist: attackers reuse patterns, and defenders need a consistent way to name those patterns. Attackers may change the exact tools they use, but the underlying techniques often rhyme. They still need initial access, they still need to execute something, they still need persistence, they still need to move around, and they still need to reach their objective, whether that objective is data theft, disruption, or fraud. Frameworks are essentially maps of those repeatable steps, expressed in different ways depending on the audience. Some are focused on high-level phases, which is useful for executive communication and incident narratives. Some are focused on detailed techniques, which is useful for detection engineering and response operations. Some are focused on application weaknesses, which is useful for developers and testers. For beginners, the key is that you do not have to pick one framework forever. You can use the framework that best matches the question you are trying to answer. When you do this, threat modeling becomes less of an art and more of a repeatable practice, which is exactly the kind of thinking SecurityX rewards.

MITRE ATT&CK (A T T & C K) is best understood as a detailed catalog of adversary tactics and techniques observed in real-world behavior. The word tactics refers to what the attacker is trying to achieve at a stage, like gaining initial access or escalating privileges, and techniques describe how they do it, like phishing, exploiting a public-facing application, or using valid accounts. Beginners sometimes think ATT&CK is a checklist of every possible attack, but the better view is that it is a language and a reference map. It helps you describe what happened in an incident and helps you plan detections and mitigations based on known behaviors. In threat modeling, ATT&CK helps you move from vague statements like attackers might hack us to specific patterns like attackers might steal credentials, create persistence, and then move laterally to reach sensitive data. On SecurityX, you might not be asked to recall a particular technique name, but you can use the mindset: identify which tactic the attacker is in and what techniques fit that stage, then choose defenses that either block or detect those techniques. ATT&CK is especially useful when you want precision about behavior, not just broad phases.

CAPEC is the Common Attack Pattern Enumeration and Classification, and its value is in describing attack patterns in a structured way that bridges between technical weaknesses and attacker behavior. For beginners, it helps to think of CAPEC as patterns of how attacks work, often connected to the kinds of weaknesses that enable them. While ATT&CK tends to focus heavily on what adversaries do across the lifecycle of an operation, CAPEC can be helpful for describing the anatomy of certain attack approaches, such as injection attacks, spoofing patterns, or abuse of system logic. In threat modeling, CAPEC can support thinking about how a specific vulnerability might be exploited or how a particular type of weakness tends to be used. The exam might not name CAPEC in a question, but if it does, the safe interpretation is that it is pointing you toward attack patterns and ways to classify them, especially useful when building a model for how an attacker could exploit a system. CAPEC is also useful when you want to educate teams about recurring patterns rather than one-off incidents, because patterns help you fix root causes. A beginner-friendly takeaway is that CAPEC helps you describe the shape of attacks, making it easier to anticipate them and to map controls that break the pattern.

STRIDE is a threat modeling framework that is often used to identify categories of threats in a system based on what can go wrong. The name is a mnemonic: Spoofing, Tampering, Repudiation, Information Disclosure, Denial of Service, and Elevation of Privilege. Beginners sometimes treat STRIDE as a list to memorize, but the power is that it forces you to consider multiple threat types rather than focusing only on one. If you are looking at a system design, STRIDE helps you ask questions like, can someone pretend to be someone else, can someone change data, can someone deny they did something, can information leak, can service be disrupted, and can someone gain more privilege than intended. That coverage matters because many security failures happen when teams fix one category, like confidentiality, but ignore another, like integrity or privilege. STRIDE is especially useful early in design because it is simple, and it helps teams identify threats without needing deep attack research. On SecurityX, STRIDE can help you reason through scenarios that involve system design choices, trust boundaries, and data flows, because it prompts you to consider the full set of threat outcomes. When the question asks which threat type is most relevant or which control addresses a certain threat category, STRIDE is a strong mental guide.

The Kill Chain is a model that describes attack progression as a sequence of stages, often used to structure thinking about how attacks unfold from planning to action. The value for beginners is that it highlights that attacks are processes, not moments. An attacker typically performs reconnaissance, prepares resources, delivers a payload or access attempt, exploits something, installs or establishes persistence, commands and controls, and then acts on objectives. The exact names of stages vary depending on the version of the model you are referencing, but the key is the staged progression. In threat modeling, the Kill Chain helps you decide where you want to break the attack. You do not have to stop an attacker at the first stage to win; you can stop them at multiple stages, and you can detect and respond before they reach the objective. This staged thinking also supports defense in depth, because you can place controls in several stages rather than relying on one perfect control. SecurityX scenarios often describe an attacker moving through stages, like phishing leading to credential theft leading to data access, and the Kill Chain lens helps you identify what stage the scenario is describing and what control would disrupt progress. It also helps you narrate incidents clearly, which is useful for reporting and program improvement.

OWASP is commonly associated with application security, and its role in threat modeling is to provide a structured view of common web and application risks, especially those that arise from software design and development practices. Beginners sometimes think OWASP is just a list of bad things, but its value is that it highlights recurring categories of weakness that lead to real breaches, such as injection flaws, broken access control, insecure design, and security misconfigurations. In threat modeling, OWASP helps you look at applications through an attacker’s eyes, focusing on how inputs are handled, how authorization is enforced, how sessions are managed, and how data is protected. This is particularly valuable because many modern systems expose application interfaces, and attackers often target those interfaces rather than trying to break through network defenses. SecurityX may include scenarios involving web applications, APIs, authentication, or data exposure, and OWASP thinking helps you identify likely failure points and mitigation priorities. Even if you never recite a list, the useful habit is to ask, does the application enforce access correctly, validate inputs, handle secrets safely, and limit exposure of sensitive data. OWASP is a framework lens that keeps application risk from being hand-waved as just coding stuff.

Now let’s connect these frameworks to practical usage, because the exam is usually asking how you would apply them rather than define them. A good workflow is to start with a high-level phase model like the Kill Chain to understand the progression, then use a detailed behavior model like ATT&CK to describe likely techniques at each stage, and then use a threat category model like STRIDE to ensure you have considered multiple outcomes. If the system in question is an application, you layer in OWASP to focus on common application weaknesses. CAPEC can fit in when you want to describe attack patterns or when you are trying to understand how a specific weakness might be exploited. This combination might sound like a lot, but in practice you are using each framework for a small task, not trying to use all of them at once in maximal detail. Beginners often get overwhelmed because they think using a framework means becoming an encyclopedia, but using a framework can be as simple as using it to prompt better questions. The frameworks are guides, not burdens. SecurityX rewards your ability to pick a useful lens and apply it logically, not your ability to name every technique under pressure.

A key practical skill is choosing the right framework for the audience and the purpose, because threat modeling is a communication task as much as a technical task. If you are briefing leadership on what happened and what needs to change, a phase model like the Kill Chain provides a narrative that is easy to follow and ties directly to decision points. If you are working with defenders and responders, ATT&CK provides more precise language that helps detection and response teams map what they saw to known behaviors. If you are doing system design review with engineers, STRIDE provides simple threat categories that match design discussions, and OWASP provides a focused lens for web and API risks that engineers can recognize. CAPEC can serve as a bridge when you need to discuss specific attack patterns that tie to software weaknesses and to threat behavior. SecurityX scenarios often implicitly set the audience by asking for actions like improve detection, update design, or communicate risk, and the best answer aligns with the right framework lens for that task. A mismatch, like using a detailed technique catalog when the question is about high-level planning, is a common distractor trap.

It is also important to understand that frameworks do not replace risk prioritization, because you can map threats forever and still not improve security if you do not choose what to address first. Frameworks can generate many potential threats, especially when you apply them thoroughly, but threat modeling like you mean it requires you to focus on threats that are plausible and impactful. This is where your earlier thinking about actors, motivations, resources, and capabilities comes back, because it helps you decide which threats deserve attention. If your likely adversary is opportunistic and profit-driven, you may prioritize threats involving credential theft, privilege misuse, and ransomware pathways. If your environment includes a critical public-facing application, you may prioritize OWASP-style access control and injection risks. If you handle sensitive data with strict obligations, you may prioritize information disclosure and tampering risks and the controls that prevent and detect them. SecurityX often asks for the best next step, and the best answer is usually not to model everything, but to use a framework to identify top threats and then take action on the highest-risk ones. Frameworks help you structure thinking, but prioritization turns thinking into protection.

Another beginner misunderstanding is thinking that a threat model is complete once it is written down, but threat models must evolve as systems change and as threats change. When you add a new feature, integrate a new vendor, or change how authentication works, you have changed the threat surface. Frameworks help you revisit the model efficiently because you can ask, what new STRIDE threats does this change introduce, what new OWASP risks appear, and what ATT&CK techniques become more plausible. The Kill Chain also reminds you that new exposure at an early stage, like a new public endpoint, can create opportunities for later stages, like persistence and exfiltration. Keeping the model current is part of managing security drift, and it ties into change management and configuration management, because changes should trigger a reassessment of high-impact threats. SecurityX scenarios may describe systems evolving quickly with inconsistent controls, and a strong response often includes integrating threat modeling into change processes, not treating it as a one-time event.

When you apply these frameworks in practice, you also learn to map controls to attack stages and threat categories, which is the bridge between threat modeling and real program improvements. For example, controls like multifactor authentication and strong access management can reduce spoofing and credential abuse, while monitoring and logging can detect suspicious behavior mapped to ATT&CK tactics. Secure configuration and patching can reduce exploitability, interrupting early Kill Chain stages. Segmentation and least privilege can reduce the attacker’s ability to move laterally and escalate privilege, limiting blast radius if initial access occurs. Input validation and proper authorization checks address OWASP-style application risks, reducing the chance that attackers can manipulate application logic or access data they should not. Remote journaling and integrity controls help detect and investigate tampering and repudiation. The point is not the specific control list, but the mapping logic: you choose controls based on where they break the attack or reduce the harm. SecurityX questions often look like control selection puzzles, and the framework lens helps you place the control in context, making the best answer stand out.

As we wrap up, threat modeling frameworks in practice are best treated as tools for structured thinking and clear communication, not as memorization targets. ATT&CK provides a detailed language for adversary behaviors that helps you describe and detect what attackers do. CAPEC provides categorized attack patterns that help you understand how certain attacks unfold and connect to underlying weaknesses. STRIDE provides a simple set of threat categories that prompts you to consider multiple security outcomes when reviewing a system. The Kill Chain provides a phased narrative that helps you understand attack progression and identify where to disrupt it. OWASP provides an application-focused lens that highlights common and impactful software risks. Used together with judgment and prioritization, these frameworks help you build threat models that lead to actionable defenses, better detection, and clearer incident narratives. SecurityX rewards this because it demonstrates you can move from vague fear to structured reasoning, from structured reasoning to targeted controls, and from targeted controls to provable improvements that reduce real risk.

Episode 19 — Threat Modeling Frameworks in Practice: ATT&CK, CAPEC, STRIDE, Kill Chain, OWASP
Broadcast by