Correlate threat models

Last updated: Mar 26, 2026


The Design Map section provides you with a correlation between your threat model and the vulnerabilities Fluid Attacks has detected in your system. These threat matches are shown to you irrespective of whether such vulnerabilities have a 'Vulnerable' or 'Safe' status. Thanks to the information in this section, you can prioritize vulnerability remediation strategically, focusing on those flaws that pose the greatest risk to your business as defined by your threat model.

Correlate your threat model on the Fluid Attacks platform

See the threat matches

Once Fluid Attacks has analyzed the appropriately formatted file(s) you have provided detailing your threat model, the table in Threat Matches shows you the following information:

  • Threat: The detailed descriptions of threats to your business as provided in your model
  • Correlated weakness: The vulnerabilities from Fluid Attacks' categorization whose descriptions match those of the threats in your model
  • Category: The names of the categories where Fluid Attacks has included the weaknesses
  • Severity: The default CVSS scores Fluid Attacks has assigned to the related vulnerabilities
  • Total vulnerabilities: The total paths in your system where the weaknesses have been present
  • Status: Total vulnerabilities by their Status:
    • Closed: Vulnerabilities that are no longer present
    • Open: Vulnerabilities that are present

Manage threat model files

You need to upload at least one correctly formatted spreadsheet detailing your threat model so that Fluid Attacks can do the correlation with the reported vulnerabilities. The name(s), description(s), and upload date(s) of those resources are shown in the table under Files.

View threat model files on the Fluid Attacks platform
  • File: The spreadsheet's name
  • Description: Your team's concise account of the file's content
  • Date uploaded: When the spreadsheet was added to the platform

Upload threat model files

When you have a spreadsheet with your threat model that is appropriately formatted, you can add it by following these steps:

  1. Navigate to Design Map

  2. Click on the Add/Add file button.

    Find option to upload a threat model on the Fluid Attacks platform
  3. Upload a spreadsheet with the .xlsx or .xls extension and write a brief description of the file's contents (maximum 200 characters).

    Add a threat model on the Fluid Attacks platform
  4. Click on Continue.

When the analysis is done, you can see the results under Threat Matches.

Delete threat model files

Follow these steps to delete threat model files:

  1. Navigate to Design Map.

  2. Under Files, select the file(s) using the checkbox(es) and click on the Delete button.

    Delete a threat model on the Fluid Attacks platform
  3. Acknowledge that you understand that once the file is removed, threat matches are recalculated with any files left. Click on the checkbox and then Confirm.

    Delete a threat model file on the Fluid Attacks platform

On this page