Are there any templates or guides anywhere which illustrate how threat models should be documented?
For example, what kind of threats are there for cloud-based/ third party instant messaging services? Would you use STRIDE (Spoofing, Tampering, Repudiation, Information disclosure, DoS, Elevatation) as a reference point? What kind of diagrams do you need?
Looking for some overall guidance to help explain how they would go about producing a threat model analysis for a third party / cloud based messaging service.