
Threat modelling at scale, without the overhead
Built for organisations already running threat modelling who need to do it continuously, across multiple teams and systems — without the admin burden that comes with managing it all manually.

Built for this from the start
We have been running this platform in our own consulting work for six years. Every feature in it came from a real threat modelling engagement — not product assumptions. The reports it generates, the risk data it structures, the integrations it supports: all of it was shaped by what organisations actually need when they start doing this seriously.
The platform is available to organisations that have worked with us and are ready to run their threat modelling programme independently, at greater scale, without engaging our services for every session.
What it replaces
Managing models at scale
Run multiple threat models across multiple systems and teams, all in one place. Your CISO gets a consolidated view of risk across the business. Your security team stops maintaining endless spreadsheets and document management system pages that are always out of date.
Outputs without the admin
Reports, risk registers, and control summaries generate automatically from the model. Download them, share them, or feed them into other systems. No more manually formatting outputs in Word or assembling board packs from five different sources.
Integration into your existing processes
Open GitHub issues for new risks. Notify teams on Slack when controls are completed. Trigger updates when code changes are deployed. Webhooks are supported out of the box, and a comprehensive API covers more complex use cases — including custom authentication, SSO, and bespoke tooling integrations.
Visual modelling that works with what you already have
Threatplane uses draw.io for diagramming — which means full-featured architecture tools are built in, and any diagrams your teams already have in draw.io or Lucidchart can be imported directly.
Scope any architecture — cloud, on-prem, hybrid, SaaS, AI systems, supply chain, trust boundaries between any of these. If the scope changes, update the diagram and the model updates with it.

What the platform produces
Every model generates a structured set of outputs — all derived from the methodology, not manual entry.
Threat Assessment
A full list of the threats facing the assets in scope, based on rigorous industry methodologies and current threat intelligence.
Controls Assessment
An evaluation of your existing security controls and how effectively they address the identified threats.
Risk Assessment
Threats mapped to business impact and control effectiveness — the basis for prioritising investment and communicating risk upwards.

Remediation Roadmap
A prioritised action plan for implementing controls, tied directly to the threats and risks in the model.
Detective Controls
Monitoring and detection recommendations that follow from the threat model — not a generic checklist, but specific to your architecture and attack surface.
