News

This Microsoft document from the early days of Redmond’s own threat modeling movement goes into more depth on how to build your own data flow diagram for your system or application.