Know our amazing features

Lorem ipsum dolor sit amet, consectetur adipisicing elit. Dolor alias provident excepturi eligendi, nam numquam iusto eum illum, ea quisquam.

A feature title

Lorem ipsum dolor sit amet, consectetur adipisicing elit. Delectus dicta error.

A feature title

Lorem ipsum dolor sit amet, consectetur adipisicing elit. Delectus dicta error.

A feature title

Lorem ipsum dolor sit amet, consectetur adipisicing elit. Delectus dicta error.

A feature title

Lorem ipsum dolor sit amet, consectetur adipisicing elit. Delectus dicta error.

Threat Modeling

Threat modeling is a systematic was to figure out security of a product or service. This is achieved by various threats and vulnerabilities, gauging their probability and impact and finally devising the fixation techniques or mitigation techniques to prevent the threat from occurring.

Apptrusty provides Mobile app security threat modeling as a service. The threat model is designed as an outline or checklist of items that need to be documented, reviewed and discussed when developing a mobile application. Every mobile app development company creates their app based on different requirements which also means different threats. Based on our experience in the subject matter, we create a model which depicts all the touch points that can result in a data leakage. At high level, these are based on 2 types of threat vectors.

Data At Rest

Data In Transit


To approach the problem statement for a given application, we use following steps to reach the conclusion and create a bigger and best picture, that brings out all threats and vulnerabilities.



  • Understand business purpose of app
  • Understand platform and frameworks
  • Decompile the app and find vulnerabilities
  • Map vulnerabilities to threats
  • Provide inputs on probability and impact
  • Create documentation to put the picture together
  • All above based on OWASP Top-10 standards

Header level Two