Skip to content
Vol. 1 · Ed. 2026
CyberGlossary
Entry № 801

PASTA Threat Model

What is PASTA Threat Model?

PASTA Threat ModelProcess for Attack Simulation and Threat Analysis, a seven-stage risk-centric threat-modeling methodology that aligns technical threats with business impact.


PASTA (Process for Attack Simulation and Threat Analysis) is a risk-centric threat-modeling methodology defined by Tony UcedaVelez and Marco Morana. It is structured into seven stages: Define Objectives, Define Technical Scope, Application Decomposition, Threat Analysis, Vulnerability and Weakness Analysis, Attack Modeling, and Risk and Impact Analysis. PASTA emphasizes linking technical threats and exploits to business objectives and quantifiable impact, leveraging data flow diagrams, attack libraries, and abuse cases. It is often chosen by larger enterprises that need a defensible, repeatable process aligned with frameworks such as NIST, ISO 27005, and FAIR, and integrates well with ASVS, MITRE ATT&CK, and CAPEC.

Examples

  1. 01

    A bank running a PASTA workshop on its mobile payment platform to prioritize fraud-related threats with revenue impact.

  2. 02

    Using CAPEC patterns during PASTA stage 6 to enumerate realistic attack scenarios against a critical API.

Frequently asked questions

What is PASTA Threat Model?

Process for Attack Simulation and Threat Analysis, a seven-stage risk-centric threat-modeling methodology that aligns technical threats with business impact. It belongs to the Compliance & Frameworks category of cybersecurity.

What does PASTA Threat Model mean?

Process for Attack Simulation and Threat Analysis, a seven-stage risk-centric threat-modeling methodology that aligns technical threats with business impact.

How does PASTA Threat Model work?

PASTA (Process for Attack Simulation and Threat Analysis) is a risk-centric threat-modeling methodology defined by Tony UcedaVelez and Marco Morana. It is structured into seven stages: Define Objectives, Define Technical Scope, Application Decomposition, Threat Analysis, Vulnerability and Weakness Analysis, Attack Modeling, and Risk and Impact Analysis. PASTA emphasizes linking technical threats and exploits to business objectives and quantifiable impact, leveraging data flow diagrams, attack libraries, and abuse cases. It is often chosen by larger enterprises that need a defensible, repeatable process aligned with frameworks such as NIST, ISO 27005, and FAIR, and integrates well with ASVS, MITRE ATT&CK, and CAPEC.

How do you defend against PASTA Threat Model?

Defences for PASTA Threat Model typically combine technical controls and operational practices, as detailed in the full definition above.

What are other names for PASTA Threat Model?

Common alternative names include: Process for Attack Simulation and Threat Analysis, PASTA.

Related terms