A storefront with cart, checkout, and a third-party payment gateway—mapped with STRIDE categories, DREAD-style scoring, and a PASTA-style staged analysis.
Customers browse products (SPA), place orders via a BFF API, and complete payment through a PCI-scoped gateway integration. Admin users manage catalog and refunds through a separate console.
Each dimension 1–10; total shown as sum / 50 for quick comparison (teams often average instead—pick one method and stay consistent).
Token replay at checkout D10 R9 A8 E7 D6 → 40/50 MITM on payment callback D9 R6 A5 E8 D5 → 33/50 Verbose logging of card data D10 R7 A6 E9 D4 → 36/50 Checkout flooding D6 R8 A4 E3 D9 → 30/50
Check threats your team has explicitly mitigated in design review. Use “Highlight unmitigated” to focus residual risk.
| STRIDE | Threat | Mitigated? |
|---|---|---|
| S | Session token theft → fraudulent checkout | |
| T | Webhook payload tampering (amount, order ID) | |
| I | Secrets or PAN in application logs | |
| D | Inventory hoarding / checkout bots | |
| E | Horizontal privilege: view another user’s orders |
| Threat | Countermeasure | Notes |
|---|---|---|
| Token replay | Short-lived tokens, binding to device / step-up for pay | Pair with anomaly detection on velocity |
| Webhook tamper | HMAC signatures, idempotency keys, clock skew limits | Rotate signing secrets; replay window tests |
| Data leakage | Log scrubbing, PCI logging standards, secret scanning | Break-glass access audited |
| Checkout DoS | Rate limits, bot management, queue/token for flash sales | Autoscale + WAF tuning |
| IDOR on orders | Server-side authorization on every read; UUID + ownership check | Integration tests for cross-tenant cases |