• All the project stakeholders e.g., cybersecurity, architects, developers, product owner etc. When should a threat model be created? • It is advisable to conduct a threat model during the design stage of a project Where should a threat model live? • Threat models should be put with other project documentation in a well-known location. • If there are any architecture changes being made, threat models should be updated accordingly in line with product versions