In one embodiment, techniques are provided for improved security threat modeling and threat intelligence for infrastructure managed by ICSs. The techniques may leverage an existing model of an ICS created in a CAD application, add to the model security properties specifying configuration of respective electronic components of the ICS, and analyze the resulting combination, together with information from a threat database to automatically generate output such as a threat model diagram, threat model report or an interactive threat intelligence dashboard. A visualization of the output may be displayed together with, or include, a graphical rendering of the infrastructure managed to aid in its interpretation.