CISSP Study Plan – Day 45 of 55 | The STRIDE Model
- Luke Ahmed
- 21 hours ago
- 3 min read
“STRIDE and threat modeling — essential CISSP topics to know FULLY!” – Luke Ahmed
Today is Day 45 of Yihenew’s CISSP study plan, focusing on the STRIDE Model — one of the most recognized threat modeling frameworks in cybersecurity.
Developed by Microsoft, STRIDE helps identify, categorize, and mitigate potential security threats during system design. For CISSP candidates, understanding STRIDE is critical because it aligns directly with risk management, software security, and threat identification — three pillars of the exam’s mindset.
Key Areas Covered in the CISSP Study Plan
Purpose of STRIDE:A structured way to evaluate system designs for vulnerabilities by mapping common threat types against security objectives (the CIA Triad and beyond).
The STRIDE Categories:
Spoofing Identity – Pretending to be another user or process.
Mitigation: Strong authentication, MFA, identity validation.
Tampering with Data – Modifying information without authorization.
Mitigation: Hashing, integrity checks, digital signatures.
Repudiation – Denying actions or transactions.
Mitigation: Logging, auditing, non-repudiation controls.
Information Disclosure – Unauthorized access to sensitive data.
Mitigation: Encryption, access controls, data classification.
Denial of Service (DoS) – Making resources unavailable.
Mitigation: Redundancy, throttling, load balancing.
Elevation of Privilege – Gaining higher access rights than authorized.
Mitigation: Privilege separation, least privilege, secure coding practices.
STRIDE vs CIA Mapping:
Spoofing → Authentication
Tampering → Integrity
Repudiation → Non-repudiation
Information Disclosure → Confidentiality
Denial of Service → Availability
Elevation of Privilege → Authorization
CISSP Exam Tie-In
STRIDE can appear in CISSP questions about software development security, risk assessment, or threat modeling.The exam often provides a scenario and asks which part of STRIDE is being violated.
If the question describes:
Impersonation → Spoofing
Unauthorized modification → Tampering
No audit trail → Repudiation
Data exposure → Information Disclosure
Service unavailability → Denial of Service
Privilege misuse → Elevation of Privilege
Recognizing these mappings instantly gives you an edge.
Quick CISSP Practice Question
Which of the following STRIDE categories refers to an attacker pretending to be a legitimate user or system?
A. Tampering
B. Spoofing
C. Repudiation
D. Elevation of Privilege
✅ Correct Answer: B. Spoofing
Explanation:Spoofing involves falsifying identity — such as IP, email, or user credentials — to gain unauthorized access. It violates authentication, one of the core principles of information security.
Think Like a Manager:When evaluating designs or controls, always ask: “What can go wrong, who can do it, and what would it cost the business?” STRIDE helps you answer those questions systematically.
👉 Can you take the Yani Challenge?
55 days of consistent CISSP prep, tackling one domain at a time, using only the resources below:
Course
Luke's CISSP Course (2 months access, $89.98)
One-to-one Zoom sessions with Luke Ahmed (2 weeks before exam)
Books, Notes, and Practice Questions
All-In-One Study Guide by Shon Harris (Around $45)
Sybex 10th Edition (Around $52.55)
Total Cost: approxiamately $250 depending on your geographic location. Yani is located in East Africa.
📚 Study Plan (55 Days of Dedication):
- Weekdays: 2–3 hours of focused study—late nights and early mornings (5 AM).
- Weekends: 5–6 hours of deep study sessions.
Pass CISSP in first attempt within 100 questions.
Yani's biggest expense was his time, committment, consistency, and dedication! It was worth it because he passed first attempt in 100 questions using the above resources only.
If Yihenew could do it, so can you.
All the best Future CISSP. You can feel free to contact me anytime as well.
Thank you.
Luke Ahmed




















