A threat model is the foundation of every security decision. Without one, you are guessing — spending resources on threats that may not apply while ignoring the ones that will actually compromise you.

This worksheet provides a structured, fill-in-the-blank framework for building a personal or organizational threat model. For a walkthrough of the threat modeling process, see our guide to building a threat model. This worksheet is designed to be printed, filled in with a pen, and revisited quarterly.

How to use this document: Work through each section sequentially. Be honest about your assets, adversaries, and current protections. The gap analysis at the end will tell you exactly where to focus your efforts. An example entry is provided in each section to demonstrate the expected level of detail.


Section 1: Profile Definition

Before modeling threats, define who you are modeling for.

Subject: _______________________________________________ (Individual name, team name, or organization)

Date: _______________________________________________

Review cycle: ☐ Monthly ☐ Quarterly ☐ Semi-annually ☐ Annually

Profile type:

  • ☐ Individual (personal privacy)
  • ☐ Individual (professional / high-risk role)
  • ☐ Small team (startup, activist group, newsroom)
  • ☐ Organization (enterprise, NGO, government agency)

Jurisdiction(s): _______________________________________________ (Where you live, operate, or store data — affects legal threat landscape)

Industry / Context: _______________________________________________ (Journalism, finance, healthcare, activism, general consumer, etc.)


Section 2: Asset Inventory

List everything worth protecting. An asset is anything whose compromise would cause harm — financial, reputational, physical, or operational.

Digital Assets

#AssetDescriptionLocationSensitivityImpact if Compromised
ExampleEmail archive10 years of personal and business emailGmail (Google servers, USA)HighIdentity theft, business exposure, blackmail material
1☐ Low ☐ Med ☐ High ☐ Critical
2☐ Low ☐ Med ☐ High ☐ Critical
3☐ Low ☐ Med ☐ High ☐ Critical
4☐ Low ☐ Med ☐ High ☐ Critical
5☐ Low ☐ Med ☐ High ☐ Critical
6☐ Low ☐ Med ☐ High ☐ Critical
7☐ Low ☐ Med ☐ High ☐ Critical
8☐ Low ☐ Med ☐ High ☐ Critical

Common digital assets to consider:

  • Email accounts (personal, business)
  • Cloud storage (Google Drive, Dropbox, iCloud)
  • Password manager vault
  • Cryptocurrency wallets and seed phrases
  • Source code repositories
  • Customer/client databases
  • Financial records and tax documents
  • Medical records
  • Private communications (messaging history)
  • Social media accounts
  • AI chat histories and prompts
  • Professional credentials and certifications

Physical Assets

#AssetLocationSensitivityImpact if Compromised
ExamplePrimary laptop (MacBook Pro)Home office + travelCriticalContains SSH keys, browser sessions, password manager
1☐ Low ☐ Med ☐ High ☐ Critical
2☐ Low ☐ Med ☐ High ☐ Critical
3☐ Low ☐ Med ☐ High ☐ Critical
4☐ Low ☐ Med ☐ High ☐ Critical

Identity and Reputation Assets

#AssetDescriptionImpact if Compromised
ExampleProfessional reputationPublic-facing identity in industryCareer damage, loss of trust, business impact
1
2
3

Section 3: Adversary Identification

Identify who might want to compromise your assets. Be specific about capability and motivation.

Adversary Matrix

#AdversaryMotivationCapability LevelResourcesTargetingLikelihood
ExampleData broker industryMonetize personal dataMediumAutomated scraping, purchase from providersBulk (untargeted)High (ongoing)
1☐ Low ☐ Med ☐ High ☐ Nation-state☐ Targeted ☐ Bulk☐ Low ☐ Med ☐ High
2☐ Low ☐ Med ☐ High ☐ Nation-state☐ Targeted ☐ Bulk☐ Low ☐ Med ☐ High
3☐ Low ☐ Med ☐ High ☐ Nation-state☐ Targeted ☐ Bulk☐ Low ☐ Med ☐ High
4☐ Low ☐ Med ☐ High ☐ Nation-state☐ Targeted ☐ Bulk☐ Low ☐ Med ☐ High
5☐ Low ☐ Med ☐ High ☐ Nation-state☐ Targeted ☐ Bulk☐ Low ☐ Med ☐ High

Common Adversary Reference

Use this table to identify which adversaries apply to your profile.

Adversary TypeMotivationTypical CapabilityRelevant For
Opportunistic criminalFinancial gainLow-MediumEveryone
Organized cybercrimeFinancial gain, ransomwareMedium-HighBusinesses, high-net-worth individuals
Data brokersMonetizationMedium (automated)Everyone
Corporate competitorCompetitive intelligenceMediumBusinesses, startups
Disgruntled insiderRevenge, financialMedium (elevated access)Organizations
Abusive partner / stalkerControl, harassmentLow-Medium (but persistent)Individuals
Hacktivist groupIdeologicalMediumOrganizations with controversial operations
Journalist / researcherPublic interestLow-MediumPublic figures, organizations
Law enforcement (domestic)Criminal investigationHigh (legal compulsion)Context-dependent
Foreign intelligence serviceEspionage, surveillanceNation-stateGovernment, defense, critical infrastructure, journalists, activists
AI training pipelineModel improvementAutomated (bulk)All AI users — see how to protect data from AI training

Section 4: Attack Surface Mapping

For each asset, identify the ways an adversary could compromise it.

Digital Attack Surface

#Asset (from Section 2)Attack VectorAdversary (from Section 3)ComplexityImpact
ExampleEmail archiveCredential phishing → Gmail loginOrganized crimeLow (social engineering)Critical
ExampleEmail archiveGoogle compelled disclosure (subpoena/CLOUD Act)Law enforcementLow (legal process)High
1☐ Low ☐ Med ☐ High☐ Low ☐ Med ☐ High ☐ Critical
2☐ Low ☐ Med ☐ High☐ Low ☐ Med ☐ High ☐ Critical
3☐ Low ☐ Med ☐ High☐ Low ☐ Med ☐ High ☐ Critical
4☐ Low ☐ Med ☐ High☐ Low ☐ Med ☐ High ☐ Critical
5☐ Low ☐ Med ☐ High☐ Low ☐ Med ☐ High ☐ Critical
6☐ Low ☐ Med ☐ High☐ Low ☐ Med ☐ High ☐ Critical
7☐ Low ☐ Med ☐ High☐ Low ☐ Med ☐ High ☐ Critical
8☐ Low ☐ Med ☐ High☐ Low ☐ Med ☐ High ☐ Critical

Common Attack Vectors Reference

CategoryAttack VectorDescription
CredentialPhishingFake login pages, spear-phishing emails
CredentialCredential stuffingReusing leaked passwords from other breaches
CredentialSIM swappingPorting phone number to intercept 2FA
NetworkMan-in-the-middleIntercepting unencrypted traffic (public Wi-Fi)
NetworkDNS hijackingRedirecting traffic via DNS manipulation
EndpointMalware / spywareCompromising device via malicious software
EndpointPhysical accessTheft or covert access to unlocked device
SocialSocial engineeringManipulating support staff, colleagues, or family
SocialImpersonationPretending to be the target to access accounts
Supply chainCompromised dependencyMalicious update to trusted software or library
LegalCompelled disclosureSubpoena, court order, national security letter — consider sovereign cloud jurisdictional protections
LegalCLOUD Act requestCross-border data request to US providers
DataAI training ingestionPrompts or data used to train AI models
DataMetadata analysisPatterns from timestamps, locations, contact graphs
DataBackup exposureUnencrypted backups accessed by provider or attacker

Physical Attack Surface

#AssetPhysical Access PointAdversaryMitigation in Place?
ExampleLaptopHotel room, airport, coworking spaceOpportunistic thief, targeted attackerFileVault enabled, firmware password set
1Y/N:
2Y/N:
3Y/N:

Section 5: Current Protections Assessment

Document what protections you already have in place. Be honest — overestimating your current security is the most common threat modeling error.

Authentication and Access Controls

ProtectionStatusDetails
Password manager☐ Yes ☐ No ☐ PartialTool: ___ Unique passwords for all accounts? ☐ Y ☐ N
Two-factor authentication (2FA)☐ Yes ☐ No ☐ PartialMethod: ☐ SMS ☐ TOTP app ☐ Hardware key ☐ Passkey
Hardware security key (YubiKey, etc.)☐ Yes ☐ NoFor which accounts? ___
Biometric locks (devices)☐ Yes ☐ NoDevices: ___
Account recovery options reviewed☐ Yes ☐ NoRecovery email/phone number secured? ☐ Y ☐ N

Encryption

ProtectionStatusDetails
Full-disk encryption☐ Yes ☐ No ☐ PartialTool: ___ (FileVault, BitLocker, LUKS)
Encrypted messaging☐ Yes ☐ No ☐ PartialTool: ___ (Signal, Threema, Wire)
Encrypted email☐ Yes ☐ No ☐ PartialTool: ___ (Proton Mail vs Gmail, PGP, S/MIME)
Encrypted cloud storage☐ Yes ☐ No ☐ PartialTool: ___ (Tresorit, Proton Drive, Cryptomator) — see our encrypt cloud storage guide
Encrypted backups☐ Yes ☐ No ☐ PartialTool: ___ Location: ___
VPN usage☐ Yes ☐ No ☐ PartialProvider: ___ Always-on? ☐ Y ☐ N

Data Hygiene

ProtectionStatusDetails
Regular account audit / deletion☐ Yes ☐ NoFrequency: ___
Data broker opt-out☐ Yes ☐ No ☐ PartialServices used: ___
Social media privacy settings reviewed☐ Yes ☐ NoLast reviewed: ___
AI tool privacy settings (training opt-out)☐ Yes ☐ No ☐ PartialTools covered: ___
Browser privacy configuration☐ Yes ☐ NoAd blocker: ☐ Y ☐ N Tracker blocking: ☐ Y ☐ N

Operational Security

ProtectionStatusDetails
Compartmentalization (separate identities)☐ Yes ☐ NoPersonal vs. professional separation? ☐ Y ☐ N
Secure communication protocols with contacts☐ Yes ☐ NoContacts using encrypted channels? ☐ Y ☐ N
Physical security awareness☐ Yes ☐ NoScreen privacy, device custody, clean desk?
Incident response plan☐ Yes ☐ NoWhat happens if a device is lost or an account is compromised?

Section 6: Gap Analysis

Cross-reference your assets (Section 2), attack vectors (Section 4), and current protections (Section 5) to identify gaps.

Gap Identification Table

#AssetThreatCurrent ProtectionGapRisk Level
ExampleEmail archiveCompelled disclosure via CLOUD ActNone (Gmail is US-hosted)Email hosted in US jurisdiction; provider can be compelled to discloseHigh
ExampleAI chat historyTraining data ingestionPartial (opted out of ChatGPT training)Claude, Gemini, and embedded AI tools not auditedMedium
1☐ Low ☐ Med ☐ High ☐ Critical
2☐ Low ☐ Med ☐ High ☐ Critical
3☐ Low ☐ Med ☐ High ☐ Critical
4☐ Low ☐ Med ☐ High ☐ Critical
5☐ Low ☐ Med ☐ High ☐ Critical
6☐ Low ☐ Med ☐ High ☐ Critical
7☐ Low ☐ Med ☐ High ☐ Critical
8☐ Low ☐ Med ☐ High ☐ Critical

Section 7: Priority Actions

Based on the gap analysis, create a prioritized action plan. Order by risk level (Critical first) and effort (quick wins first within each risk level).

Action Plan

PriorityGap (from Section 6)ActionEffortCostDeadlineStatus
ExampleEmail in US jurisdictionMigrate to Proton Mail (Swiss jurisdiction)Medium (migration time)$48/yr30 days☐ Not started
ExampleNo hardware 2FAPurchase 2 YubiKeys, register on critical accountsLow$50-1007 days☐ Not started
1☐ Low ☐ Med ☐ High☐ Not started ☐ In progress ☐ Done
2☐ Low ☐ Med ☐ High☐ Not started ☐ In progress ☐ Done
3☐ Low ☐ Med ☐ High☐ Not started ☐ In progress ☐ Done
4☐ Low ☐ Med ☐ High☐ Not started ☐ In progress ☐ Done
5☐ Low ☐ Med ☐ High☐ Not started ☐ In progress ☐ Done
6☐ Low ☐ Med ☐ High☐ Not started ☐ In progress ☐ Done
7☐ Low ☐ Med ☐ High☐ Not started ☐ In progress ☐ Done
8☐ Low ☐ Med ☐ High☐ Not started ☐ In progress ☐ Done

Quick Win Checklist

These actions take less than one hour each and immediately improve your security posture:

  • Enable 2FA on your top 5 most critical accounts (email, bank, password manager, cloud storage, social media)
  • Review and remove unnecessary account recovery options (old phone numbers, insecure recovery emails)
  • Enable full-disk encryption on all devices (FileVault on Mac, BitLocker on Windows, LUKS on Linux)
  • Install a hardware-key-compatible password manager if you do not already have one
  • Opt out of AI training for all AI tools you use (ChatGPT, Claude, Gemini — check settings for each, or review our AI compliance checklist)
  • Review app permissions on your phone and revoke unnecessary access
  • Set up a separate browser profile for sensitive activities (banking, email, healthcare)
  • Configure DNS-over-HTTPS (NextDNS, Cloudflare 1.1.1.1, or Quad9)
  • Check haveibeenpwned.com for compromised credentials
  • Remove your profile from at least 3 data broker sites

Section 8: Threat Model Summary

Fill in this summary after completing all sections. This is your reference document for security decisions.

Subject: _______________________________________________

Top 3 assets by sensitivity:




Most likely adversaries:




Highest-risk gaps:




Immediate actions (next 7 days):




Medium-term actions (next 30 days):




Next review date: _______________________________________________

Reviewed by: _______________________________________________


Threat Model Maintenance

A threat model is not a one-time exercise. Review and update on this schedule:

TriggerAction
Scheduled review date arrivesComplete full worksheet again
You change jobs or rolesReassess adversaries and assets
You move to a new jurisdictionReassess legal threats
A breach affects a service you useReassess that asset’s attack surface
You adopt a new AI tool or SaaS productAdd to asset inventory and assess
Your personal circumstances change (public profile, relationship, travel)Reassess physical and social threats
A new regulation takes effect in your jurisdictionReassess compliance requirements

This worksheet is maintained by Stealth Cloud. It is provided as a practical security planning tool. Threat modeling is context-dependent — a worksheet cannot replace professional security consultation for high-risk individuals or organizations.