There are a number of core principles for cybersecurity analysis out there for quite some time, initially driven by IT security for many years. Those principles have been adopted and further extended by security researchers and practitioners in different industries leading to a number of different available definitions and approaches. To cope with these approaches, the tool comes with several cybersecurity configuration capabilities, that supports the customization of almost each term and attribute that is used. There is a default configuration based on best practices, taking commonly accepted principles from CIA, HEAVENS and taxonomy mnemonic-based approaches (e.g., STRIDE). The settings can be changed on project level but also on user preference level.