-
Notifications
You must be signed in to change notification settings - Fork 0
Using Notes and Documentation
Eric Fitzgerald edited this page Nov 12, 2025
·
1 revision
Document your threat modeling process with rich markdown notes.
TMI supports comprehensive documentation through markdown-formatted notes with Mermaid diagram support.
- Navigate to threat model
- Click "Notes" section
- Click "New Note" or "Add Note"
- Enter title and content
- Save (auto-save may be enabled)
- Title: Descriptive name
- Content: Markdown-formatted text
- Author: Creator
- Last Modified: Update timestamp
- Metadata: Custom properties
# Heading 1
## Heading 2
### Heading 3
**Bold text**
*Italic text*
`code`
- Bullet list
- Another item
1. Numbered list
2. Second item
[Link text](https://example.com)| Column 1 | Column 2 | Column 3 |
|----------|----------|----------|
| Data | Data | Data |
| More | More | More |```python
def example():
return "Hello, World!"
```> This is a blockquote
> Multiple lines```mermaid
flowchart LR
A[Start] --> B[Process]
B --> C[End]
``````mermaid
flowchart TD
A[User Request] --> B{Authenticated?}
B -->|Yes| C[Process Request]
B -->|No| D[Deny Access]
C --> E[Return Response]
D --> E
``````mermaid
sequenceDiagram
User->>+API: Login Request
API->>+Auth: Validate Credentials
Auth-->>-API: Token
API-->>-User: Success + Token
``````mermaid
graph TB
subgraph "Frontend"
A[Web App]
B[Mobile App]
end
subgraph "Backend"
C[API Gateway]
D[Services]
end
A --> C
B --> C
C --> D
```Security Assumptions:
- Document trust assumptions
- Authentication expectations
- Data handling policies
Threat Modeling Decisions:
- Why certain approaches were chosen
- Tradeoffs considered
- Alternatives rejected
Out of Scope:
- What's not included
- Future considerations
- Deferred items
Security Controls:
- Existing protections
- Planned mitigations
- Control effectiveness
Review Notes:
- Review sessions
- Action items
- Follow-ups
Link to other parts of TMI:
- Link to specific threats
- Reference diagrams
- Cross-reference notes
- Architecture documentation
- Security policies
- Compliance requirements
- Related systems
- Use headings for organization
- Break into logical sections
- Use lists for readability
- Document all assumptions
- Explain decisions
- Record rationale
- Note limitations
- Update as system evolves
- Review regularly
- Mark outdated sections
- Version important changes
- Mermaid diagrams for clarity
- Tables for comparisons
- Code blocks for examples
# Security Assumptions
## Authentication
- All users authenticate via OAuth 2.0
- MFA required for administrative access
- Session timeout: 30 minutes of inactivity
## Data Protection
- All data in transit encrypted with TLS 1.3
- All data at rest encrypted with AES-256
- PII stored in dedicated secure database
## Network
- All production systems in private VPC
- No direct internet access to databases
- All ingress through load balancer# Decision: Use JWT for API Authentication
## Context
Need to authenticate API requests from multiple client types.
## Decision
Use JWT tokens issued after OAuth login.
## Rationale
- Stateless authentication
- Works across multiple services
- Industry standard
- Good library support
## Consequences
- Must protect token secret
- Need token rotation strategy
- Clock skew considerations- Multiple users can edit notes
- Real-time synchronization
- See collaborator cursors
- Automatic conflict resolution
- Add comments to notes
- Discuss specific sections
- @mention team members
- Track discussions
Future features may include:
- Export as PDF
- Export as Markdown file
- Include in threat model export
- Learn about Metadata and Extensions
- Review Collaborative Threat Modeling
- Explore API Integration for programmatic access
- Using TMI for Threat Modeling
- Accessing TMI
- Creating Your First Threat Model
- Understanding the User Interface
- Working with Data Flow Diagrams
- Managing Threats
- Collaborative Threat Modeling
- Using Notes and Documentation
- Metadata and Extensions
- Planning Your Deployment
- Deploying TMI Server
- Deploying TMI Web Application
- Setting Up Authentication
- Database Setup
- Component Integration
- Post-Deployment
- Monitoring and Health
- Database Operations
- Security Operations
- Performance and Scaling
- Maintenance Tasks