DFD ingestion & versioning
Source of truthIngest DFD JSON with trust zones, processes, entities, data stores, and flows. Every upload becomes a versioned snapshot per system with history and diffs.
terep ingests DFD JSON, builds a System Knowledge Graph, runs a rule-based STRIDE engine, and gives security and engineering teams versioned threat models, diffs, and Mermaid diagrams via API.
Ingest DFD JSON from your existing diagram tools
Build a live System Knowledge Graph from every architecture
Generate STRIDE threats, versions, diffs, and Mermaid diagrams via API
Define systems, ingest DFDs, run a rule-based STRIDE engine and keep every threat model snapshot versioned—with SKG views and Mermaid diagrams for reviews.
Use /auth/bootstrap and /auth/login to create an admin or modeler, obtain a JWT, and define the systems you want to threat model via POST /systems.
Export or generate DFD JSON from your favorite modeling tools and send it to POST /systems/{systemId}/dfd/json to create a versioned snapshot of your architecture.
Call POST /systems/{systemId}/threats with { "methodology": "STRIDE" } to build the System Knowledge Graph, run rules, and store a structured threat model snapshot.
Use /dfd/versions, /threats/versions, and the diff endpoints plus /skg/mermaid and /skg/mermaid/threats to review history, compare snapshots, and embed diagrams in docs and wikis.
DFD snapshot
Versioned architecture view
System Knowledge Graph
Normalized nodes, flows, trust zones
STRIDE threat model
Snapshot with categories and severity
From DFD ingestion and SKG to STRIDE snapshots and Mermaid diagrams, terep gives security and engineering teams an API-first threat modeling backbone.
Ingest DFD JSON with trust zones, processes, entities, data stores, and flows. Every upload becomes a versioned snapshot per system with history and diffs.
Normalize architecture into a graph that captures nodes, edges, and trust boundaries. Use it as the backbone for rules, analytics, and visualizations.
Run a rule-based STRIDE engine on the latest DFD to generate structured threats, store snapshots in Mongo, and compare how risk changes over time.
Export SKG views as Mermaid diagrams—with or without threat overlays—so you can embed architecture and risk views into docs, wikis, and reviews.
Secure access with JWT auth and roles for admins, modelers, and readers. Keep modeling workflows controlled while letting stakeholders explore safely.
Automate threat modeling from CI/CD, architecture reviews, and custom tooling. terep exposes every capability via HTTP APIs designed for automation.
Compare static diagrams, spreadsheets, and generic GRC tools with an API-first backend that stores DFDs, SKG views, STRIDE snapshots, and diffs in one place.
| Category | Static diagrams & slides | Spreadsheets & trackers | Generic GRC tools | terep |
|---|---|---|---|---|
| Architecture source of truth | Scattered files and screenshots | Linked out to docs and tools | High-level systems, not DFD-native | DFD-nativeVersioned DFD JSON per system with SKG views |
| Threat modeling method | Workshops, manual checklists | Columns for STRIDE, manual updates | Questionnaires and controls | DFD-nativeRule-based STRIDE engine over a System Knowledge Graph |
| History & diffs | Rarely captured or hard to compare | No snapshot concept, copy-paste history | Process audits, not model diffs | DFD-nativeSnapshot history and DeepDiff for DFDs and threats |
| Integration | Not API-driven | Email and CSV uploads | Limited technical API usage | DFD-nativeAPI-first, CI/CD and tooling friendly |
Use ready-made views for systems modeled, DFD versions, threat snapshots, STRIDE distribution, and open vs resolved threats—then tailor them to each workspace and stakeholder.
Systems modeled
See how many systems are actively modeled in terep and how coverage grows over time.
DFD versions over time
Track how many DFD snapshots you create per system and where the architecture is changing most.
Threat model snapshots
Visualize snapshots generated via /threats and see how often STRIDE runs per system.
Threats by STRIDE category
Break down threats by STRIDE category and severity to understand where risk clusters.
Open vs resolved threats
Compare newly introduced, resolved, and unchanged threats between snapshots using diff APIs.
Risk by trust zone
Summarize risk by trust zone or boundary to highlight where sensitive flows cross.
Highlight where sensitive flows cross boundaries so reviews focus on the riskiest trust zones.
Compare static diagrams and spreadsheets against an API-first backend that keeps DFDs, STRIDE snapshots, and diagrams versioned over time.
From security architects and AppSec to DevSecOps, engineering and risk teams, terep keeps DFDs, STRIDE snapshots and history in one API-first platform.
Standardize how your organization does STRIDE: define systems, ingest DFDs, and keep a living, versioned threat model for every critical app.
Automate threat generation from architecture updates, plug into CI/CD, and give developers concrete STRIDE findings with diagrams.
Integrate terep into pipelines so DFD changes and releases trigger new threat models, diffs, and SKG exports.
See architecture, data flows, and risk in one place. Use history and diffs to support reviews, sign-offs, and roadmap decisions.
Evidence continuous threat modeling with versioned snapshots, STRIDE coverage, and change-aware diffs across systems.
Run repeatable, API-first threat modeling for multiple clients, with separate systems, snapshots, and diagrams per engagement.
Start with a single system, then grow into multi-team, multi-system threat modeling—while keeping DFDs, STRIDE snapshots and diagrams in one place.
For security and engineering teams standardizing threat modeling.
Security, AppSec and engineering leaders use terep to keep DFDs, STRIDE snapshots and diagrams in sync instead of chasing stale slides and spreadsheets.
“With terep we finally have a living threat model per system. Architecture reviews are grounded in real DFDs, STRIDE snapshots, and diffs instead of static slides.”
“The API-first flow means every major system change now regenerates a STRIDE model automatically. My team spends time validating threats, not copying them between tools.”
“terep connects how we draw architectures with how we talk about risk. History and diffs make it obvious what changed, why it matters, and whether we made things safer.”
Plug terep into your DFD sources, CI/CD and review workflows so every system change regenerates STRIDE threats, updates snapshots, and keeps diagrams and history in sync.