TalksAWS re:Invent 2025 - Threat-Modeling-As-Code - Transforming Your Threat Statements into Attack Trees
AWS re:Invent 2025 - Threat-Modeling-As-Code - Transforming Your Threat Statements into Attack Trees
Threat Modeling as Code: Transforming Threat Statements into Attack Trees
Overview
Presenters: Danny, a principal security specialist, and Christian, a data scientist, from AWS
Discussed threat modeling as a framework to identify, analyze, and mitigate security risks in applications
Introduced an open-source tool called "Threat Forest" that automates the process of generating attack trees from threat statements
The Threat Modeling Framework
Consists of 4 key questions:
What are we working on?
What can go wrong?
What are we going to do about it?
Did we do a good enough job?
Performed early in the design phase to identify threats and implement appropriate controls
Helps align business, development, and security teams to understand and address risks
Threat Statements
Structured format to describe threats: "A threat source with some prerequisites can do something that leads to some impact, which results in the reduction of a required property or goal of an asset."
Provides a consistent way to analyze threats, including categorizing by severity, actor type, and impacted assets
Can be expanded into attack steps, which describe the detailed attack paths an adversary could take
Attack Trees
Graphical representation of the different ways an asset can be attacked
Builds on the threat statement structure to map out the various attack steps and their relationships
Provides a comprehensive view of potential attack vectors and their likelihood/impact
Threat Forest Tool
Open-source CLI tool developed by AWS to automate the generation of attack trees
Supports multi-modal input (code, docs, diagrams) to extract context about the application
Uses a novel prompt optimization technique (DSPY) to generate high-quality attack trees
Maps attack steps to the MITRE ATT&CK framework for alignment with known threats and mitigations
Key Features and Benefits
Reduces security review time by 22-23% when used as part of the application security process
Helps developers and security teams collaborate on threat modeling early in the development lifecycle
Enables proactive identification of threats and implementation of appropriate controls
Can be used to scope penetration testing and validate defensive capabilities
Technical Details
Uses an agent-based architecture with specialized agents for parsing input, extracting context, and generating attack trees
Leverages sentence embedding models (e.g., Attack Bird) to map attack steps to MITRE ATT&CK techniques
Stores the generated attack trees in a local graph database for efficient querying and analysis
These cookies are used to collect information about how you interact with this website and allow us to remember you. We use this information to improve and customize your browsing experience, as well as for analytics.
If you decline, your information won’t be tracked when you visit this website. A single cookie will be used in your browser to remember your preference.