Define objectivesDefine technical scopeDecompose applicationThreat analysisVulnerability analysisAttack modelingRisk and impact analysisFurther readingPASTA threat modeling on Versprite