Writing Effective Application Descriptions
The application description is the foundation of your threat model. A well-written description helps AegisShield generate accurate, comprehensive threats tailored to your specific system.What Information to Include
Your application description should provide a complete picture of your system. Based on real-world examples, here’s what to include:Application Purpose
Start with a clear statement of what your application does and who uses it.Example from Voice-Based Applications:
“A voice-based application with IoT integration, designed to facilitate user interactions through voice commands.”
Architecture Overview
Describe the major components and how they interact.Example from Retail Management System:
“The application features an Angular frontend and a Flask backend with a MySQL database. Store managers can sign up for an account, log in using email and password authentication, and manage their inventory, sales, and employee schedules.”
Key Features and Workflows
List the main features and typical user workflows.Example:
- User authentication (email and password)
- Real-time inventory management
- Sales tracking and reporting
- Employee schedule management
- Low stock notifications
Data Handling
Explain what data the system processes and how it’s protected.Example:
“Data is encrypted both in transit and at rest, and the system includes role-based access control to restrict sensitive information to authorized personnel.”
Complete Example Description
Here’s the example from the AegisShield interface (step1_description.py:238-239):
A small business management application designed for local retail stores to streamline their operations. The application features an Angular frontend and a Flask backend with a MySQL database. Store managers can sign up for an account, log in using email and password authentication, and manage their inventory, sales, and employee schedules. The application supports real-time updates and notifications, ensuring managers are always aware of low stock levels and sales trends. Data is encrypted both in transit and at rest, and the system includes role-based access control to restrict sensitive information to authorized personnel. Additionally, the application integrates with popular payment gateways like Stripe and PayPal to process transactions securely.
Real-World Examples from Case Studies
Example 1: Visual Sensor Network
Fromcase_study_2.md, a Visual Sensor Network description includes:
Example 2: 5G Core Slicing
Fromcase_study_3.md, a telecommunications system description:
Using the Image Upload Feature
AegisShield supports AI-powered analysis of architecture diagrams (available for OpenAI GPT-4o and GPT-5 models).Prepare Your Diagram
Create an architecture diagram showing:
- System components
- Data flows between components
- Trust boundaries
- External interfaces
Upload the Image
In Step 1, click “Upload an image of your application (optional)” and select your diagram.AegisShield will analyze the diagram using OpenAI’s vision model (
step1_description.py:196).Review AI Analysis
The AI will generate a description focusing on:
- Key components and their interactions
- Technologies visible in the diagram
- Data flows and communication patterns
Validation Requirements
AegisShield validates your description before proceeding:- Minimum length: 50 characters (excluding whitespace)
- Character count: Displayed as you type
- Completeness check: Ensure all required information is included
step1_description.py:142-145, the validation ensures meaningful input:
Common Mistakes to Avoid
Why This Matters
Fromstep1_description.py:246-256, AegisShield uses your description to:
- Identify specific context and scope - Understanding your unique threat landscape
- Tailor the threat model - Addressing particular functionalities and features
- Consider all relevant threats - Including those specific to your use case and environment
- Search vulnerability databases - NVD and AlienVault OTX based on your technologies
- Map to MITRE ATT&CK - Identifying relevant tactics, techniques, and procedures
The more detailed and accurate your description, the more precise and comprehensive the threat model will be. AegisShield pulls information from the National Vulnerability Database (NVD) and AlienVault OTX, then maps threats to the MITRE ATT&CK framework.
Next Steps
After completing your application description:- Review for completeness - Have you covered all major components?
- Check character count - Aim for a comprehensive description (200+ characters recommended)
- Click Next - Move to Step 2 to specify your technology stack
- Save the description - It will be used throughout the threat modeling process
threat_model.py:116-203), where it’s combined with technology details, NVD vulnerabilities, and industry-specific threat intelligence to generate comprehensive STRIDE-based threats.