Steps to decompose an application architecture to discover vulnerabilities
How to identify and document threats that are relevant to your application