Engineering Deep-Dive · ATT&CK v18.1 · All 47 Findings
Threat Model + AppSec + IaC · Updated May 2026 · with Architecture Context
Audience: Engineering + Security Leadership · Use ← → arrow keys or buttons to navigate
23 components · 7 trust boundaries · 4 trust zones
| Component | Role | Trust Zone | Boundary |
|---|---|---|---|
| Example Component | Role description | Zone name | TB-N |
| TB-ID | Boundary | Risk Note |
|---|---|---|
| TB-1 | Boundary description | Risk note |
graph TD
subgraph EXT["External"]
U(["Users"])
end
subgraph IDN["Identity"]
IDP["Identity Provider"]
end
subgraph APP["Application Tier"]
GW["API Gateway"]
SVC["Service"]
DB[("Database")]
end
subgraph INFRA["Infrastructure"]
COMP["Compute"]
STG[("Storage")]
end
subgraph MON["Monitoring"]
LOG["Logging"]
end
U -->|Auth| IDP
IDP -->|Token| GW
GW --> SVC
SVC --> DB
SVC --> STG
COMP --> STG
LOG -.-> SVC
%% Replace this diagram with actual architecture.
%% Use subgraphs for trust zones.
%% Color affected nodes on per-finding slides.
7 trust boundaries · 4 trust zones · 23 components
ATT&CK v18.1 · Active groups · Top techniques by usage
| Group | ID | Relevant Techs | Primary Tactics | v18.1 Status |
|---|
| Technique | Name | Tactic | Score | System Relevance |
|---|
21 threats · 6 categories · KQL + Bicep + APIM for each
Component: {{Component}} / {{Trust Boundary}}
{{Description of the threat}}
ATT&CK:
T{{ID}} — {{Technique Name}} | {{tactic}}
Mitigations:
M{{ID}} — {{Mitigation Name}}
Detection:
{{Data Component}} → {{Azure Log Source}}
graph LR
A["Component A"] --> B["Component B"]
B --> C["Component C"]
style A fill:#f85149,color:#fff,stroke:#f85149
%% Color the AFFECTED component(s) with severity color:
%% Critical: fill:#f85149 High: fill:#d29922 Medium: fill:#bc8cff
// {{KQL query for detection}}
14 application-layer findings · CWE + ATT&CK mapped
12 infrastructure-as-code and CI/CD findings · Bicep fixes
Coverage matrix · detection gaps · P0-P3 remediation · 90-day plan
| Finding | Likelihood | Impact | Risk |
|---|
| ID | Action | Owner |
|---|
{{PHASE_1_ACTIONS}}
{{PHASE_2_ACTIONS}}
{{PHASE_3_ACTIONS}}
{{PHASE_4_ACTIONS}}
Helios Payments Platform — Security Review · Engineering Deep-Dive
ATT&CK v18.1 · 47 Findings · May 2026
VELO · Vulnerability Evaluation & Lifecycle Orchestration · Classification: Internal / Restricted