We’ve spent the last two articles talking about how to do threat modeling using frameworks like STRIDE and asking the right questions to find the holes in your logic. But now we need to answer the question that always comes up when you're asking for budget or time: Why do we actually have to do this?
If you look at the major security frameworks, you might notice something frustrating. Most of them don’t actually use the words "threat modeling." Because of that, teams often skip it, thinking it’s an optional "nice-to-have" engineering exercise.
That's a dangerous assumption.
Even when a standard doesn't explicitly mandate threat modeling, it almost always requires the results that only threat modeling can provide. Let’s look at where it’s hidden, where it’s expected, and where it’s absolutely mandatory.
Why most frameworks don't mandate "Threat Modeling"
It might seem weird that major security frameworks don't just come out and say "Thou Shalt Threat Model." But there are a few practical reasons for that:
- Scalability: Standards like ISO 27001 have to work for everyone, from a two-person startup to a Fortune 500 enterprise.
- Velocity: Technology changes fast. If a standard mandated a specific tool or methodology today, it’d be obsolete by next year.
Strict mandates usually just lead to "checkbox compliance." So instead of telling you how to do it, regulators focus on the outcome. They ask: "Have you identified your risks?" and "Can you prove your controls work?"
Level 1: Compliance Evidence (The "Implicit" Requirement)
This is where most of us live. You might be looking at ISO/IEC 27001, SOC 2, or GDPR and thinking, "I don't see the words threat modeling anywhere."
You're right, you won't. But look closer at what they do ask for.
- ISO/IEC 27001 (Clause 6.1.2): Requires a systematic risk assessment process. How do you accurately identify risks without modeling threats?
- SOC 2 (CC 3.1): Asks how you identify risks to your business objectives.
- GDPR (Article 35): Requires a Data Protection Impact Assessment (DPIA) for high-risk processing. That is effectively a privacy-focused threat model.
- PCI DSS v4.0: The latest version introduces the Targeted Risk Analysis (TRA) (Requirement 12.3). If you customize your controls, you must perform a specific risk analysis—essentially a targeted threat model—to prove your security is equivalent.
In all these cases, threat modeling is your best friend during an audit. When an auditor asks, "How did you decide you didn't need a firewall here?", you don't want to shrug. You want to pull out your threat model. It turns a subjective opinion into defensible evidence.
Level 2: Strong Guidance (The "Standard of Care")
Moving up the ladder, we enter the area of "strong guidance." These frameworks might not legally force you to do it, but they treat threat modeling as a standard duty of care. If you suffer a breach, you’re going to have a hard time explaining why you skipped this step.
- NIST SP 800-218 (SSDF): The Secure Software Development Framework is becoming the gold standard for anyone selling software to the government. It explicitly lists threat modeling as a core practice for secure development.
- NIST SP 800-161: This covers supply chain risk. It recommends threat analysis to figure out where your weak points are before a vendor compromises you.
- OWASP ASVS: If you are building web apps, the Application Security Verification Standard pushes threat modeling as a hard requirement for achieving Level 2 or Level 3 assurance.
Level 3: Explicitly Required (The "Mandate")
Now the options disappear. If you are working in government or critical infrastructure, you don't really have a choice.
- NIST SP 800-53 (Control RA-3): If you're dealing with federal systems, this is the bible. It explicitly requires a risk assessment that identifies threats and vulnerabilities. While it doesn't force a specific methodology, you cannot satisfy this requirement by guessing; you must document the analysis.
- CIS Controls (v8): Control 11 specifically mandates a secure configuration process, which relies heavily on understanding your specific threat landscape to determine what needs locking down.
Level 4: Safety-Critical (The "Life or Death" Requirement)
Finally, we reach the highest stakes. In safety-critical industries like aviation or automotive, a hack doesn't just mean lost data; it means lost lives. Consequently, the standards here stop suggesting and start enforcing rigorous engineering processes.
- Avionics (DO-326A / ED-202A): If you want to fly, this isn't a suggestion. It mandates a rigorous airworthiness security process.
- Automotive (ISO/SAE 21434): This standard requires you to perform TARA (Threat Analysis and Risk Assessment). It’s not optional for modern vehicles.
- Medical Devices (FDA Guidance): The FDA will reject your 510(k) submission if you haven't modeled threats to patient safety.
Bringing it all together
While threat modeling is an engineering activity, the PROTECT pipeline generates the evidence required for major compliance standards as an outcome of its execution. Each stage of your threat model answers a critical question likely to be asked during a NIST, ISO, or SOC 2 audit:
- 1. VAST (The Lens): Defines your attack surface. (Audit Question: "Did you accurately define the scope of the assessment?")
- 2. STRIDE (The Net): Captures the vulnerabilities. (Audit Question: "What methodology did you use to identify potential security failures?")
- 3. DREAD (The Scale): Quantifies the risk. (Audit Question: "How did you prioritize which risks to accept versus mitigate?")
- 4. LINDDUN (The Blindspot): Addresses privacy requirements. (Audit Question: "How are you meeting GDPR/CCPA data privacy obligations?")
- 5. PASTA (The Fix): Validates the outcome. (Audit Question: "Can you demonstrate that your controls actually reduce the risk?")
So, what’s the bottom line? Threat modeling isn't just an engineering exercise. Threat modeling is your paper trail.
It proves you looked for the problems, analyzed the risks, and implemented countermeasures. In the world of compliance, if you didn't document it, you didn't do it.
The PROTECT framework introduced earlier in this series was never about compliance for its own sake. It was about making threat modeling effective, repeatable, and decision-oriented.
- Article 1 showed how to do threat modeling comprehensively.
- Article 2 showed what questions actually matter when doing it.
- Article 3 explains why threat modeling remains one of the strongest tools for meeting real-world security, regulatory, and assurance expectations.
Threat modeling makes risk visible, decisions defensible, and security outcomes explainable when it matters most.


