End-to-End: From Architecture to Compliance Evidence
Master the complete Product Security Hub workflow—from drawing your first architecture diagram to exporting audit-ready compliance evidence.
The Complete Product Security Hub Workflow
Product Security Hub connects your architecture, threats, requirements, and vulnerabilities into a unified security posture. Here's how everything flows together:
Architecture
Draw diagrams & map to components
Components
Auto-populate from diagrams or add manually
Threats & Requirements
Auto-generated based on component types
Residual Risk
Assess gaps when requirements aren't met
SBOM & Vulnerabilities
Track dependencies & known CVEs
Export & Evidence
Generate compliance-ready artifacts
Phase 1: Build Your Architecture
Every security program starts with understanding what you're protecting. Product Security Hub includes an embedded draw.io editor that lets you create architecture diagrams directly in the platform.
Creating Your Diagram
- a
Navigate to Architecture — Open your product and click the "Architecture" tab to access the diagram editor.
- b
Add shapes from the palette — Drag components like servers, databases, APIs, users, and external services onto the canvas.
- c
Draw data flows — Connect shapes with arrows to show how data moves through your system.
- d
Define trust boundaries — Group components by trust level (internal network, DMZ, external, etc.).
🔗 Linking Diagram Assets to Components
This is the key step that powers Product Security Hub's automation. Each shape in your diagram can be linked to a component type from Product Security Hub's catalog.
- Select a shape in the diagram editor
- In the properties panel, choose a Component Type from the catalog (e.g., "Web Server", "Database", "API Gateway")
- This link enables Product Security Hub to auto-generate relevant threats and requirements for that asset
Phase 2: Manage Your Components
Components are the building blocks of your product's security model. Product Security Hub gives you two ways to populate your component inventory:
From Architecture
When you link a diagram shape to a component type and save, Product Security Hub can automatically add that component to your inventory.
Benefit: Keeps your diagram and component list in sync. Visual changes flow directly into your security model.
Manual Entry
Navigate to the Components page and click "Add Component" to manually add components that may not appear in your diagram.
Use case: Internal services, shared infrastructure, or inherited components that aren't product-specific.
⚡ What Happens When Components Are Added
Once a component is added to your product (via diagram or manually), Product Security Hub automatically pulls in the associated threats and security requirements from the catalog based on that component type. No manual mapping required—the intelligence is built into the component definitions.
Phase 3: Review Threats & Requirements
With components in place, Product Security Hub auto-generates a tailored threat model and requirements checklist. Your job is to review and assess each one.
Working with Threats
Product Security Hub uses the STRIDE methodology to categorize threats. For each threat, you'll need to set a disposition:
Mitigated
You have controls in place that address this threat
Transferred
Risk is handled by a third party (e.g., cloud provider)
Accepted
Risk is acknowledged and accepted by stakeholders
Not Applicable
Threat doesn't apply to your specific implementation
Working with Requirements
Security requirements are linked to threats—meeting them helps mitigate the associated risks. For each requirement, indicate your compliance status:
Met
Requirement is fully implemented
Partially Met
Some controls exist but gaps remain
Not Met
Requirement is not implemented
🚨 When Requirements Aren't Met: Residual Risk
Marking a requirement as "Not Met" triggers an important workflow: Product Security Hub automatically creates a residual risk record tied to the associated threat(s).
This ensures that unmitigated risks are tracked, documented, and visible to stakeholders—not hidden in a spreadsheet.
Phase 4: Assess Residual Risk
Residual risks represent the exposure that remains when security requirements can't be fully met. Product Security Hub helps you document and manage these gaps systematically.
Residual Risk Assessment Process
- 1
Review auto-created risks — Navigate to the Residual Risk page to see risks generated from unmet requirements.
- 2
Assess severity — Use the CVSS calculator or your organization's risk matrix to rate each residual risk.
- 3
Document justification — Explain why the requirement can't be met and what compensating controls exist (if any).
- 4
Get approval — Route significant residual risks through your risk acceptance process.
💡 Pro Tip: Use AI to Draft Justifications
Product Security Hub's AI assistant can help you draft risk justifications and CVSS score rationales. Click the "Generate" button on any text field to get a starting point, then refine as needed.
Phase 5: Track SBOM & Vulnerabilities
Beyond architecture-level threats, Product Security Hub helps you track vulnerabilities in your software dependencies through SBOM management.
The SBOM Workflow
Import your SBOM — Upload a CycloneDX file, use the Excel template, or add components manually.
Scan for vulnerabilities — Click "Scan Now" or configure automatic scanning to check against Google OSV.
Triage results — Review discovered CVEs and prioritize based on severity and exploitability.
Track remediation — Document patches, updates, and workarounds applied to address vulnerabilities.
📝 Manually Documenting Patches
Product Security Hub allows you to manually add patch records and tie them to specific vulnerabilities and risks. This is useful for:
- Documenting vendor-provided patches that update multiple components
- Recording custom fixes or workarounds for vulnerabilities
- Creating an audit trail of security updates over time
Phase 6: Export Compliance Evidence
Once your product's security posture is documented, Product Security Hub makes it easy to export everything for audits, reviews, or integration with other tools.
Excel Export
Export your entire product security profile to a comprehensive Excel workbook with multiple sheets:
- • Product overview & metadata
- • Components list
- • Threats with dispositions
- • Requirements with compliance status
- • Residual risks
- • SBOM components & vulnerabilities
JSON Export (Product Security Hub Format)
Export to Product Security Hub's structured JSON format—a product security data structure designed for:
- • Integration with CI/CD pipelines
- • Programmatic analysis and reporting
- • Backup and version control
- • Data migration and import to other Product Security Hub instances
How to Export
- 1
Navigate to your product's main dashboard
- 2
Click the Export button in the action bar
- 3
Choose your format: Excel (.xlsx) or JSON (.json)
- 4
Download and share with auditors, stakeholders, or archive for records
Putting It All Together
The Product Security Hub workflow creates a connected security story—from the architecture you draw, to the threats you identify, to the evidence you export.
Ready to Start Your Security Journey?
From first diagram to compliance evidence—Product Security Hub guides you through every step of building a robust product security program.