# MODULES

- [Threat Modeler](/modules/threat-modeler.md): How to do threat modeling with DevArmor
- [Threat Modeler Overview](/modules/threat-modeler/threat-modeler-overview.md): An overview of DevArmor's Threat Modeler
- [Data Model Hierarchy](/modules/threat-modeler/data-model-hierarchy.md): Understand how DevArmor organizes and isolates threat model data across different teams and projects.
- [Starting a threat model](/modules/threat-modeler/starting-a-threat-model.md): How to start a threat model
- [Verify Application Attributes](/modules/threat-modeler/verify-application-attributes.md): After describing the application, you can review and validate threat model inputs
- [Review Threat Model Output](/modules/threat-modeler/review-threat-model-output.md): Review and approve threats, risks, controls, and other threat model outputs.
- [Implement Threat Model Results](/modules/threat-modeler/implement-threat-model-results.md): How to operationalize threat model outputs
- [Design Reviewer](/modules/design-reviewer.md)
- [Jira Integration (Security Design Review)](/modules/design-reviewer/jira-integration-security-design-review.md): Connect DevArmor to your Jira workspace to automatically run security design reviews on new tickets and surface security requirements directly where engineers work.
- [Code Reviewer](/modules/code-reviewer.md)
