MAESTRO

07 - Templates

Version: 1.0.0

This section provides reusable templates for each major artifact produced during a MAESTRO threat modeling engagement. Copy these templates into your working documents and fill them in as you progress through each phase.


Table of Contents

  1. Layer Mapping Template
  2. Threat Card Template
  3. Assumption Template
  4. Business Context Template
  5. Mitigation Card Template
  6. Threat Actor Template
  7. Trust Boundary Template
  8. Asset Flow Template
  9. Code Validation Template
  10. Residual Risk Template
  11. Executive Summary Template
  12. Remediation Roadmap Template
  13. Threat Register Summary Template

Layer Mapping Template

Use this template to map your system’s components to MAESTRO layers:

MAESTRO Layer System Components & Features Notes
1. Foundation Models [LLM name, API/self-hosted, version] [Model ownership, alignment, fine-tuning]
2. Data Operations [Vector DB, RAG pipeline, document stores, data sources] [Data freshness, access controls, indexing]
3. Agent Frameworks [Framework name, MCP servers, tool definitions, workflow logic] [Autonomy level, tool access, planning]
4. Deployment Infrastructure [Compute, networking, storage, orchestration, messaging] [IAM, network segmentation, service accounts]
5. Evaluation & Observability [Logging, dashboards, HITL interfaces, anomaly detection] [Audit completeness, review capacity]
6. Security & Compliance [Auth, RBAC, secrets mgmt, policy engines, regulations] [Compliance requirements, enforcement gaps]
7. Agent Ecosystem [External APIs, human users, other agents, third-party services] [Trust assumptions, communication protocols]

Instructions: For each layer, list every component in your system that operates at that layer. A single component may appear in multiple layers (e.g., an MCP server appears in L3 for tool definitions and L4 for its runtime infrastructure). The Notes column should capture initial observations about security-relevant properties.


Threat Card Template

Use this template for each identified threat. One card per threat.

Field Value
Threat ID [T#]
Threat Name [Name]
MAESTRO Layer(s) [L1-L7, Cross-Layer]
ASI Mapping [T1-T15 or Extended]
STRIDE Category [S/T/R/I/D/E]
Description [What the threat is]
Attack Vector [Network/Adjacent/Local/Physical]
Attack Complexity [Low/High]
Severity [Low/Medium/High/Critical]
Likelihood [Unlikely/Possible/Likely/Very Likely]
Agentic Factors [Which of the 4 factors apply]
Affected Components [List]
Prerequisites [What attacker needs]
Impact [What happens if exploited]
Mitigations [Link to mitigation IDs]

Field Guidance:


Assumption Template

Use this template to document each assumption made during the threat model.

Field Value
Assumption ID [A#]
Description [The assumption]
Rationale [Why this is assumed]
Impact if Wrong [What happens if assumption is invalid]
Validation Method [How to verify]
Status [Validated/Unvalidated/Invalidated]

Field Guidance:

Best Practices:


Business Context Template

Use this template at the start of Phase 1 to capture the business context for the system under review.

Field Value
Application Name  
Business Domain  
Data Classification [Public/Internal/Confidential/Restricted]
Regulatory Requirements [SOX/GDPR/HIPAA/etc.]
Criticality [Low/Medium/High/Critical]
User Base [Internal/External/Both]
Agent Type [Single/Multi-Agent]
Autonomy Level [Human-approval-per-action / Human-in-loop / Fully autonomous]

Field Guidance:

Example (filled in):

Field Value
Application Name Financial Document Processing Agent
Business Domain Finance / Accounting
Data Classification Confidential
Regulatory Requirements SOX, GDPR
Criticality High
User Base Internal
Agent Type Single
Autonomy Level Human-in-loop

Mitigation Card Template

Use this template alongside the Threat Card to document each mitigation.

Field Value
Mitigation ID [M#]
Mitigation Name [Name]
Type [Preventive/Detective/Corrective/Deterrent]
Description [What the mitigation does]
Addresses Threats [List of Threat IDs]
Cost [Low/Medium/High]
Effectiveness [Low/Medium/High]
Implementation Status [Not Implemented/Partially Implemented/Implemented]
Owner [Team or individual responsible]

Field Guidance:


Threat Actor Template

Use this template during Phase 3 to profile each threat actor relevant to your system.

Field Value
Actor ID [TA#]
Actor Category [External Attacker/Malicious Insider/Compromised Agent/Nation-State/Automated Threat]
Capability [Low/Moderate/High/Advanced]
Motivation [Financial/Espionage/Disruption/Ideology/Opportunistic]
Target Assets [List]
Likely Attack Vectors [List]
Target MAESTRO Layers [L1-L7]
Relevance [Relevant/Partially Relevant/Not Relevant]
Priority [Low/Medium/High/Critical]

Field Guidance:

Best Practices:


Trust Boundary Template

Use this template during Phase 4 to document each trust boundary crossing in the system.

Field Value
Boundary ID [TB#]
Source Zone [Zone name and trust level]
Destination Zone [Zone name and trust level]
Crossing Components [Components involved]
Protocol [Communication protocol]
Authentication [Mechanism or “None”]
Authorization [Mechanism or “None”]
Input Validation [Yes/No/Partial]
Encryption in Transit [Yes/No]
Logging [Yes/No/Partial]
Boundary Strength [Strong/Moderate/Weak]
Associated Threats [Threat IDs]

Field Guidance:

Best Practices:


Asset Flow Template

Use this template during Phase 5 to trace each critical asset through the system lifecycle.

Field Value
Asset ID [AF#]
Asset Name [Name]
Classification [Public/Internal/Confidential/Restricted]
Created At [Component/Layer]
Stored At [Component(s)]
Transmitted Via [Protocol/Channel]
Processed By [Component(s)]
Destroyed [How/When or “Never”]
Trust Zones Traversed [List]
Exposure Points [List]
Protection Controls [Encryption/ACL/Masking/etc.]

Field Guidance:

Best Practices:


Code Validation Template

Use this template during Phase 8 to validate that planned mitigations are actually implemented in the codebase.

Field Value
Validation ID [CV#]
Mitigation ID [M# from Phase 7]
Expected Code Artifact [File/module/config]
Implementation Status [Implemented/Partially Implemented/Not Implemented]
Code Evidence [File path, function, line numbers]
Gaps Found [Description of gaps]
Anti-Patterns Detected [List]
Test Coverage [Covered/Partial/None]
Remediation Priority [Low/Medium/High/Critical]

Field Guidance:


Residual Risk Template

Use this template during Phase 9 to document residual risk after mitigations are applied.

Field Value
Residual Risk ID [RR#]
Threat ID [T# from Phase 6]
Inherent Risk [Critical/High/Medium/Low]
Mitigation Effectiveness [High/Medium/Low/None]
Implementation Status [From Phase 8]
Residual Risk Level [Critical/High/Medium/Low]
Disposition [Mitigated/Accepted/Transferred/Deferred]
Risk Owner [Name and role]
Review Schedule [Monthly/Quarterly/Semi-Annually/Annually]
Trigger Events [Events requiring re-evaluation]

Field Guidance:


Executive Summary Template

Use this template during Phase 10 to produce a one-page summary for stakeholders.

Field Value
System Name [Name]
Assessment Date [Date]
Analyst(s) [Names]
Scope [What was included/excluded]
Overall Risk Posture [Critical/High/Medium/Low]
Total Threats Identified [#]
Critical/High Threats [#]
Mitigations Planned [#]
Mitigations Implemented [#]
Top 3 Risks [Brief descriptions]
Key Recommendations [Brief list]
Next Review Date [Date]

Field Guidance:

Best Practices:

AI-Assisted Disclaimer (include when threat model is AI-generated):

Disclaimer: This threat model was generated with AI assistance using the OWASP MAESTRO Playbook. It must be reviewed by a qualified security professional before use in production risk decisions. AI-generated threat models may contain errors, omissions, or fabricated content.


Remediation Roadmap Template

Use this template during Phase 10 to plan the sequenced implementation of mitigations.

Field Value
Remediation ID [REM#]
Threat(s) Addressed [T# list]
Mitigation(s) [M# list]
Description [What needs to be done]
Priority Phase [Immediate (0-30d) / Short-term (30-90d) / Medium-term (90-180d) / Long-term (180d+)]
Effort [Low/Medium/High]
Responsible Team [Team name]
Dependencies [Other REM# items]
Status [Not Started/In Progress/Complete]

Field Guidance:

Best Practices:


Threat Register Summary Template

Use this template to produce a summary view of all threats identified during the engagement. It provides a single-page overview for stakeholders and supports deduplication across phases.

Register ID: [Unique identifier, e.g., TR-2025-001] Date: [Date of register compilation] Analyst: [Name/team] System: [System name from Phase 1]

Total Threats Identified: [Count]

Threats by Layer

MAESTRO Layer Count Critical High Medium Low
L1 - Foundation Model          
L2 - Data Operations          
L3 - Agent Frameworks          
L4 - Deployment Infrastructure          
L5 - Evaluation & Observability          
L6 - Security & Compliance          
L7 - Agent Ecosystem          
Cross-Layer          
Total          

Threats by Severity

Severity Count With Mitigation Without Mitigation
Critical      
High      
Medium      
Low      

Deduplication Notes: [Record any threats identified at multiple layers and how they were consolidated. Reference the primary Threat Card ID for each deduplicated threat.]

Key Findings Summary: [3-5 sentence summary of the most significant findings for executive consumption.]

Recommended Priority Order: [Ordered list of the top 5 threats requiring immediate attention, with Threat Card IDs.]


Attribution: OWASP GenAI Security Project - Multi-Agentic System Threat Modelling Guide. Licensed under CC BY-SA 4.0.


Previous Up Next
06 - Modeling Process 00 - Overview 08 - Checklists