Workflow

Threat Persistence and Tracking

Track threats across scans with a git-friendly threat model file. Manage threat lifecycle from detection through resolution with drift detection.

Persistent Tracking

Scan results saved to .threatmodel.yaml, creating a persistent record designed to be committed to your repository.

Threat Lifecycle

Manage threats through new, accepted, mitigated, and false_positive statuses.

Drift Detection

Compare current infrastructure against saved threat model to identify new, changed, and resolved threats.

Git-Friendly

YAML format with clean diffs, designed for pull request reviews and version control workflows.

How It Works

Scan results are saved to .threatmodel.yaml (configurable), creating a persistent record of all detected threats. This file is designed to be committed to your repository.


Threat Lifecycle

StatusMeaning
newNewly detected threat
acceptedRisk acknowledged and accepted
mitigatedRemediation applied
false_positiveDetermined to be non-applicable

Managing Threats

1
2
3
4
5
6
7
8
# Accept a risk
threatmitigator accept T-AWS-S3-001 --reason "Public website bucket"

# Mark as mitigated
threatmitigator mitigate T-AWS-S3-002 --reason "Added encryption"

# Mark as false positive
threatmitigator dismiss T-AWS-S3-003 --reason "Not actually public"

Commit .threatmodel.yaml to version control to track changes over time.


Drift Detection

The check-drift command compares current infrastructure against the saved threat model to identify:

  • New threats introduced since last scan
  • Previously accepted threats that have changed
  • Resolved threats that are no longer detected
1
2
# CI/CD drift detection
threatmitigator check-drift ./infra --format json --severity-threshold medium

The check-drift command never modifies .threatmodel.yaml, making it safe for CI pipelines.

See it in action

Track threats across scans with persistent state and drift detection for continuous security monitoring.

Demo

Ready to Secure Your Infrastructure?

Join teams already using ThreatMitigator to identify security threats in their Terraform, CloudFormation, Docker, and Helm configurations.