This Microsoft doc through the early days of Redmond’s individual threat modeling motion goes into additional depth on how to Develop your very own info circulation diagram for the process or application. A long run SEI weblog post will supply direction on how To judge these models to be used https://ieeexplore.ieee.org/document/9941250