No items found.

Simple threat model for web app

Visualize your web app's security posture with the simple threat model example.

Simple threat model for web app

Visualize your web app's security posture with the simple threat model example.

Data Flow Diagrams
Flow Chart
No items found.
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
about this example

Threat modeling is a pivotal security technique in application development. This example provides:

  • Flow of sensitive data: Shows how user data traverses the system.
  • Potential vulnerabilities: Identifies where data might be exposed.
  • Security mechanisms: Highlights areas where encryption and admin tools are applied.
  • Admin/User differentiation: Differentiates between user access and admin access points.

When to use
  • Initial security planning: When outlining the security measures for a new web application.
  • Security training: To educate new team members on security best practices.
  • Security assessment: As a checklist during security audits to ensure no critical points are unprotected.

How to use
  1. Start editing: Duplicate example file and double click on the diagram.
  2. Customize diagram: Add/modify nodes, groups, relationships using Eraser's simple diagram-as-code syntax. Use icons where possible to enhance understanding.
  3. Customize layout: Drag elements on the diagram directly on the canvas to manipulate layout.
  4. Collect feedback: Share file with collaborators and encourage them to use the comments feature for feedback.

Use Eraser for all of your diagrams and docs

Beyond data flow diagrams, do you need to create other technical docs and diagrams like design docs, RFCs, network diagrams, and API diagrams? Eraser provides a single platform for modern engineering teams to collaborate on docs and diagrams.

Whiteboard and document together

See you in the canvas

Unlock your team’s collaborative super powers.