Threat Model Diagram Example: Threat Modeling for Ceph RBD


The connection between Ceph RDB Data store and the Ceph monitor Controller is shown here in this Threat Model diagram.

Easily diagram your Threat Model Diagram. Use this template as a starting point and to create your own basic Threat Model Diagram. No prior registration required.

What is Threat Model?

Threat model is a process which points out the potential threats towards an application. These can be structural vulnerabilities that needs to be identified, enumerated, and prioritized.

How to draw a Threat Model Diagram?

Identify possible risks and find solutions to prevent it.

  1. Create a Threat Model Diagram.
  2. Select a shape then drag and drop it into the drawing canvas
  3. Once your diagram is complete, you can save it (File > Save as) to our cloud repository for future access. You can also export your work into image (JPG, PNG, PDF, SVG, etc) and share it with your co-workers.

Keen to try VP Online?

No limitations, no obligations, no cancellation fees.

Start a Free Trial

We use cookies to offer you a better experience. By visiting our website, you agree to the use of cookies as described in our Cookie Policy.