
There’s been a lot of discussion around Apple’s replacement of TouchID with FaceID on the new iPhone X. There’s conversation around the overall security of biometric authentication vs. as well as comparisons of TouchID security vs. that of FaceID.
Unfortunately, the usual question being asked is something like:
Which is more secure?
But what they should be asking is a more nuanced:
For my particular situation, am I more secure using a password, TouchID, or FaceID?
This is the reason Threat Modeling is important: it highlights the fact that it’s impossible to understand the efficacy of a control without understanding how it’ll be attacked.
I built the system above to highlight this concept as it relates to different types of personal device authentication. It’s a crude model, but it shows the key considerations and how they map to reality. Here’s the structure of the model.
So here’s the methodology for determining which auth system makes the most sense for you.

Now we run the numbers multiplying the scenario weight by the control strength for each control.
So, considering just the Password control
3 + 2 + 3 = 8.
So, considering just the TouchID control
9 + 8 + 2 = 19.
So, considering just the FaceID control
12 + 8 + 1 = 21.
So we end up with the relative strength—for this set of scenarios—being: Passwords (8), TouchID (19), and FaceID (21). So with the highest score, FaceID wins.
What’s important here is that these numbers represent a combination of both your most important scenarios (the weighting of the multiplier) AND the effectiveness of the controls across those various situations.
Given as an English sentence we’d basically be saying:
Based on me valuing these scenarios the most, and the effectiveness of each authentication system in those situations, FaceID seems best match for me, with TouchID being pretty close and passwords lagging pretty far behind.
And here’s the key: I only spent a few moments coming up with those ratings, and there are more scenarios that could be added. And as you update the data in the model, your recommended authentication method (the highest score) might change along with it.
Hopefully this will help some folks understand Threat Modeling a bit more—at least at a basic level—and thus enable clearer thinking about how various security measures can be rated for practical effectiveness.