Security for Legal SaaS

Episode 2 · Module 1 · Foundations

The STRIDE Framework

18 May 2026 · 9:12 · Security for Legal SaaS

0:00 9:12

STRIDE is a 27-year-old threat classification framework that still dominates industry practice. In this episode, Alice and Dan walk through all six categories — Spoofing, Tampering, Repudiation, Information Disclosure, Denial of Service, and Elevation of Privilege — applying each to a legal document review workflow. They explore why Repudiation matters more in legal tech than anywhere else, and how to turn STRIDE findings into prioritised backlog items.

Today’s Lesson

Six Threats, One Mnemonic

STRIDE is a threat classification framework created by Loren Kohnfelder and Praerit Garg at Microsoft in 19991 as part of the Security Development Lifecycle. The acronym encodes six categories of threat — Spoofing, Tampering, Repudiation, Information Disclosure, Denial of Service, and Elevation of Privilege — giving engineers a structured vocabulary for answering “what can go wrong?” at every element of a system diagram.

Twenty-seven years later, STRIDE remains the most widely adopted threat classification in industry.2 Adam Shostack turned the six categories into the Elevation of Privilege card game4 — 78 cards, one per threat scenario — making threat identification accessible to non-security engineers.

STRIDE Mapped to Security Properties

Each STRIDE category violates a specific security property. The classic CIA triad covers three; STRIDE extends coverage to Authentication, Non-repudiation, and Authorization5 — the full CIANA+ model.

Category Violates Legal Tech Consequence
SpoofingAuthenticationAttacker impersonates a partner to access privileged case files
TamperingIntegrityContract redline history altered post-signature
RepudiationNon-repudiationUser denies approving document disclosure; no audit proof exists
Information DisclosureConfidentialityPrivileged documents leak into non-privileged search results
Denial of ServiceAvailabilityE-discovery platform unreachable during a filing deadline
Elevation of PrivilegeAuthorizationParalegal account escalates to partner-level matter access

Key insight: The CIA triad alone misses three of STRIDE’s six categories. If your security review only asks “is it confidential, integral, and available?” you will miss authentication, non-repudiation, and authorization threats entirely.6

STRIDE Analysis of a Document Review Workflow

Consider a typical AI-assisted document review pipeline: a lawyer uploads a contract, the system runs AI analysis, a human reviews the results, and the final output is exported to a client portal. Data flow diagrams make trust boundaries visible7 — and trust boundaries are where threats concentrate.

Stage S T R I D E
UploadForged identity submits docsFile modified in transitNo proof who uploadedFilename leaks matter infoOversized files exhaust storageUnauthenticated upload endpoint
AI AnalysisPrompt injection alters analysisNo log of what AI processedAI accesses cross-tenant docsModel overload blocks reviewsAI runs with admin DB creds
Human ReviewSession hijackEdits without audit trailReviewer denies approvingReview screen leaksReviewer locked out at deadlineReviewer escalates permissions
ExportRecipient spoofedExport tamperedNo proof of deliveryBundle contains extra docsExport service unavailableExport bypasses ACL

Why Repudiation Matters More in Legal Tech

In e-commerce, repudiation means a customer disputes a charge. In legal tech, repudiation means a lawyer claims they never approved a privilege designation — and you cannot prove otherwise. ABA Formal Opinion 477R9 requires lawyers to make “reasonable efforts” to prevent unauthorised disclosure. If your system cannot prove who did what and when, you have failed that standard.

Case study — Orrick, Herrington & Sutcliffe (2023): Unauthorized access went undetected from November 2022 to March 2023,10 affecting 637,620 individuals. The firm paid $8 million to settle the class action. A core allegation: inadequate logging and detection — a repudiation and information disclosure failure.

Anti-Repudiation Controls

Control Implementation
Immutable audit logsAppend-only log store; cryptographic hash chaining; no admin delete
Trusted timestampsRFC 3161 or equivalent; server clock alone is insufficient
Digital signatures on approvalsReviewer cryptographically signs privilege designations
Segregation of log accessOperators who manage the system cannot modify audit records
Retention aligned to limitationLegal matters litigate years later; logs must survive

From STRIDE Findings to Backlog Items

A threat model produces threats. Threats must become tickets. Rank by two axes — impact and likelihood:

High Likelihood Low Likelihood
High ImpactFix immediately (Sprint 0)Schedule this quarter
Low ImpactSchedule next sprintDocument and accept

The Verizon 2024 DBIR12 found that privilege misuse rose to the second most common breach pattern. Internal actors represented 35% of breaches in 202413, up from 20% the prior year. Elevation of Privilege findings deserve higher priority than teams historically assign.

Practical tip: Run STRIDE on one workflow per sprint. A 30-minute session yields 15–25 threats. Triage immediately. Three sprints in, you have systematic coverage of your highest-risk flows — and a backlog that reflects actual threats rather than compliance checkboxes.

Conclusion

STRIDE gives you a repeatable lens for finding threats. Apply it to every element of your data flow diagram — processes, data stores, data flows, trust boundaries — and you surface threats that “best practice” checklists miss. For legal tech, Repudiation deserves special attention: your system must prove who did what, when, with cryptographic certainty. Without that, a breach is not just a data loss — it is an unprovable one.

Sources & references

  1. Microsoft, “Threats — Threat Modeling Tool,” Azure Security Documentation — STRIDE developed by Kohnfelder & Garg, 1999
  2. OWASP, “Threat Modeling Process”
  3. Microsoft Security Development Lifecycle, “Threat Modeling”
  4. Adam Shostack, “Elevation of Privilege Game” — 78 cards across STRIDE suits; Creative Commons licensed
  5. Wikipedia, “STRIDE model” — maps each category to a security property
  6. NIST SP 800-154 (Draft), “Guide to Data-Centric System Threat Modeling,” March 2016
  7. Microsoft Learn, “Create a Threat Model Using Data-Flow Diagram Elements”
  8. OWASP, “Threat Modeling Cheat Sheet”
  9. ABA Formal Opinion 477R, “Securing Communication of Protected Client Information,” May 2017
  10. Maryland State Bar Association, “Law Firm Settles Data Breach Lawsuit” — Orrick breach; $8M settlement
  11. NIST SP 800-154, “Guide to Data-Centric System Threat Modeling”
  12. Verizon, 2024 Data Breach Investigations Report — privilege misuse rose to 2nd most common pattern
  13. Verizon, “2024 DBIR Executive Summary” — internal actors 35% of breaches
  14. OWASP, “Threat Dragon” — open-source threat modeling tool