Today’s Lesson
Six Threats, One Mnemonic
STRIDE is a threat classification framework created by Loren Kohnfelder and Praerit Garg at Microsoft in 19991 as part of the Security Development Lifecycle. The acronym encodes six categories of threat — Spoofing, Tampering, Repudiation, Information Disclosure, Denial of Service, and Elevation of Privilege — giving engineers a structured vocabulary for answering “what can go wrong?” at every element of a system diagram.
Twenty-seven years later, STRIDE remains the most widely adopted threat classification in industry.2 Adam Shostack turned the six categories into the Elevation of Privilege card game4 — 78 cards, one per threat scenario — making threat identification accessible to non-security engineers.
STRIDE Mapped to Security Properties
Each STRIDE category violates a specific security property. The classic CIA triad covers three; STRIDE extends coverage to Authentication, Non-repudiation, and Authorization5 — the full CIANA+ model.
| Category | Violates | Legal Tech Consequence |
|---|---|---|
| Spoofing | Authentication | Attacker impersonates a partner to access privileged case files |
| Tampering | Integrity | Contract redline history altered post-signature |
| Repudiation | Non-repudiation | User denies approving document disclosure; no audit proof exists |
| Information Disclosure | Confidentiality | Privileged documents leak into non-privileged search results |
| Denial of Service | Availability | E-discovery platform unreachable during a filing deadline |
| Elevation of Privilege | Authorization | Paralegal account escalates to partner-level matter access |
Key insight: The CIA triad alone misses three of STRIDE’s six categories. If your security review only asks “is it confidential, integral, and available?” you will miss authentication, non-repudiation, and authorization threats entirely.6
STRIDE Analysis of a Document Review Workflow
Consider a typical AI-assisted document review pipeline: a lawyer uploads a contract, the system runs AI analysis, a human reviews the results, and the final output is exported to a client portal. Data flow diagrams make trust boundaries visible7 — and trust boundaries are where threats concentrate.
| Stage | S | T | R | I | D | E |
|---|---|---|---|---|---|---|
| Upload | Forged identity submits docs | File modified in transit | No proof who uploaded | Filename leaks matter info | Oversized files exhaust storage | Unauthenticated upload endpoint |
| AI Analysis | — | Prompt injection alters analysis | No log of what AI processed | AI accesses cross-tenant docs | Model overload blocks reviews | AI runs with admin DB creds |
| Human Review | Session hijack | Edits without audit trail | Reviewer denies approving | Review screen leaks | Reviewer locked out at deadline | Reviewer escalates permissions |
| Export | Recipient spoofed | Export tampered | No proof of delivery | Bundle contains extra docs | Export service unavailable | Export bypasses ACL |
Why Repudiation Matters More in Legal Tech
In e-commerce, repudiation means a customer disputes a charge. In legal tech, repudiation means a lawyer claims they never approved a privilege designation — and you cannot prove otherwise. ABA Formal Opinion 477R9 requires lawyers to make “reasonable efforts” to prevent unauthorised disclosure. If your system cannot prove who did what and when, you have failed that standard.
Case study — Orrick, Herrington & Sutcliffe (2023): Unauthorized access went undetected from November 2022 to March 2023,10 affecting 637,620 individuals. The firm paid $8 million to settle the class action. A core allegation: inadequate logging and detection — a repudiation and information disclosure failure.
Anti-Repudiation Controls
| Control | Implementation |
|---|---|
| Immutable audit logs | Append-only log store; cryptographic hash chaining; no admin delete |
| Trusted timestamps | RFC 3161 or equivalent; server clock alone is insufficient |
| Digital signatures on approvals | Reviewer cryptographically signs privilege designations |
| Segregation of log access | Operators who manage the system cannot modify audit records |
| Retention aligned to limitation | Legal matters litigate years later; logs must survive |
From STRIDE Findings to Backlog Items
A threat model produces threats. Threats must become tickets. Rank by two axes — impact and likelihood:
| High Likelihood | Low Likelihood | |
|---|---|---|
| High Impact | Fix immediately (Sprint 0) | Schedule this quarter |
| Low Impact | Schedule next sprint | Document and accept |
The Verizon 2024 DBIR12 found that privilege misuse rose to the second most common breach pattern. Internal actors represented 35% of breaches in 202413, up from 20% the prior year. Elevation of Privilege findings deserve higher priority than teams historically assign.
Practical tip: Run STRIDE on one workflow per sprint. A 30-minute session yields 15–25 threats. Triage immediately. Three sprints in, you have systematic coverage of your highest-risk flows — and a backlog that reflects actual threats rather than compliance checkboxes.
Conclusion
STRIDE gives you a repeatable lens for finding threats. Apply it to every element of your data flow diagram — processes, data stores, data flows, trust boundaries — and you surface threats that “best practice” checklists miss. For legal tech, Repudiation deserves special attention: your system must prove who did what, when, with cryptographic certainty. Without that, a breach is not just a data loss — it is an unprovable one.