PASTA is a seven-stage, risk-centric threat modelling methodology. Unlike STRIDE (which asks
"what can go wrong?" per component), PASTA asks "what is the attacker trying to achieve,
and what is the business impact if they succeed?" — making it well-suited to risk prioritisation
and executive reporting.
STAGE 1
Define Objectives
Establish business context: what assets matter, what regulations apply,
what would a breach cost the organisation.
e.g. "A credential breach on our payment portal would trigger PCI-DSS breach
notification and estimated $2M in fines."
STAGE 2
Define Technical Scope
Inventory the technical environment: infrastructure, OS, middleware, APIs,
third-party dependencies, and network boundaries.
e.g. "The application runs on AWS ECS behind an ALB; it uses RDS PostgreSQL
and calls three third-party payment APIs."
STAGE 3
Application Decomposition
Produce a Data Flow Diagram (DFD): identify components, data flows,
trust boundaries, entry points, and exit points.
e.g. Browser → WAF → App Server → DB. Trust boundaries: internet/DMZ/internal.
Entry points: login, file upload, API.
→ TMS DFD per scenario
STAGE 4
Threat Analysis
Enumerate threat actors, their motivations, capabilities, and likely TTPs
using threat intelligence and MITRE ATT&CK.
e.g. "Financially motivated external actor using credential stuffing (T1110.004)
and SSRF (T1190) targeting the login endpoint."
→ TMS Step 1: Threat Identification
STAGE 5
Vulnerability & Weakness Analysis
Map known CVEs, design flaws, and OWASP weaknesses to the components
identified in Stage 3 that threat actors could exploit.
e.g. "The login endpoint lacks rate limiting (OWASP A7), enabling the
T1110.004 credential stuffing threat identified in Stage 4."
STAGE 6
Attack Modelling & Simulation
Build attack trees and simulate realistic attack scenarios end-to-end,
tracing paths from initial access to target impact.
e.g. Phishing → credential theft → VPN access → NTLM relay → file server
→ DCSync → full domain compromise.
→ TMS Attack Chain per scenario
STAGE 7
Risk & Impact Analysis
Rate residual risk using likelihood × impact; map findings to business impact;
prioritise mitigations by risk reduction value.
e.g. OWASP 8-factor: Likelihood 7 × Impact 8 = CRITICAL.
Recommended control: enforce MFA (reduces likelihood from 7 to 2).
→ TMS Step 2: Risk Rating