BionicWP's Threat Modelling Approach
BionicWP approaches threat modeling as a shared responsibility between our internal teams (in partnership with sub-service providers) and our customers’ IT organizations.
Our process is built into the system design, change management, and risk assessment phases of our SOC 2 control framework:
1. BionicWP’s Responsibilities
BionicWP performs threat modeling as part of its secure design and ongoing operational processes for the BionicWP Dashboard and hosting platform:
System-level modeling: Identifying and evaluating potential threats to the confidentiality, integrity, and availability of hosted environments, including application-layer vulnerabilities, data exposure, authentication weaknesses, and privilege-escalation risks.
Infrastructure-level analysis: Reviewing threats across virtualized environments, APIs, load balancers, Redis caching, supporting sub-service layers, etc.
Control implementation: Applying and maintaining layered controls—such as network segmentation, intrusion detection, vulnerability management, patching, monitoring, and least-privilege access.
Continuous monitoring: Incorporating logs, alerts, and vulnerability scans into ongoing risk assessments and SOC reporting.
Sub-service oversight: Ensuring sub-service providers (Automattic/WP Cloud, Aptum, AWS, DigitalOcean, Heroku, etc.) maintain appropriate controls under their SOC 2 or equivalent attestations.
2. Client’s IT Responsibilities
Since BionicWP manages the hosting environment but not customer application logic or data handling, customers are responsible for:
Securing their WordPress administrator accounts, including strong passwords, 2FA, and role-based access.
Securing their BionicWP Dashboard accounts, including strong passwords, 2FA, and role-based access.
Reviewing and managing plugins, themes, and code to prevent vulnerabilities introduced at the application level.
Ensuring secure integration of external systems or APIs.
Implementing organizational security measures such as endpoint protection, employee awareness, and incident response.
Notifying BionicWP of any suspicious activity or suspected compromise within their application.
3. Shared Responsibilities
Both parties share responsibility for:
Incident coordination: Prompt communication in the event of a detected or suspected threat.
Periodic review: Evaluating changes in the threat landscape and adjusting configurations accordingly.
