The threat model you built last year? It's already wrong. Not because you did a bad job — because the attack surface moved while you were documenting it.
The Comfortable Lies We Tell Ourselves
Most organizations are still threat modeling like it's 2019. Perimeter-focused thinking. Castle-and-moat diagrams. Trust boundaries that assume your supply chain isn't already compromised.
Here's what's actually happening:
- Your perimeter doesn't exist — Between cloud workloads, SaaS integrations, and remote workers, the "inside" vs "outside" distinction is a polite fiction
- Supply chain is the new front door — SolarWinds wasn't an anomaly. It was a proof of concept that every threat actor took notes on
- Identity is the only real boundary — And your IdP is probably one phished credential away from total compromise
What Changed
Three shifts have fundamentally broken traditional threat models:
1. Cloud Sprawl
Your developers spun up 47 new services last month. Your security team found out about 12 of them. The threat model covers 3.
Shadow IT isn't the problem — it's that your model assumes you know what you're protecting.
2. AI-Assisted Attacks
Attackers aren't manually crafting phishing emails anymore. They're generating thousands of contextually relevant lures, automating reconnaissance, and using ML to identify the path of least resistance.
Your threat model probably still has "phishing" as a single line item. That's like listing "weapons" as a threat to a military base.
3. Supply Chain Weaponization
Every dependency is a potential backdoor. Every SaaS integration is a trust relationship you didn't explicitly authorize. The Log4j aftermath showed us that most organizations don't even know what's in their own stack.
What Actually Works
Time to rebuild. Here's where to start:
Assume breach. Your threat model should start from "they're already in" and work backwards. What's the blast radius? What are the crown jewels? How do you detect lateral movement?
Map your actual attack surface. Not the one in the architecture diagrams — the real one. Cloud assets, SaaS integrations, third-party code, API endpoints. All of it.
Identity-centric thinking. Every access decision is a potential compromise point. Model it that way.
Continuous validation. Threat models aren't documents, they're hypotheses. Test them. Break them. Update them.
The Bottom Line
If your threat model doesn't account for supply chain compromise, cloud misconfiguration, and identity-based attacks as primary vectors, you're defending against yesterday's threats.
The attackers adapted. Time to catch up.