11.07.2015 Views

Improving Web Application Security: Threats and - CGISecurity

Improving Web Application Security: Threats and - CGISecurity

Improving Web Application Security: Threats and - CGISecurity

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Chapter 3: Threat Modeling 47Threat Modeling PrinciplesThreat modeling should not be a one time only process. It should be an iterativeprocess that starts during the early phases of the design of your application <strong>and</strong>continues throughout the application life cycle. There are two reasons for this. First,it is impossible to identify all of the possible threats in a single pass. Second, becauseapplications are rarely static <strong>and</strong> need to be enhanced <strong>and</strong> adapted to suit changingbusiness requirements, the threat modeling process should be repeated as yourapplication evolves.The ProcessFigure 3.1 shows the threat modeling process that you can perform using a six-stageprocess.Note The following process outline can be used for applications that are currently in development<strong>and</strong> for existing applications.Threat Modeling Process1. Identify Assets2. Create an Architecture Overview3. Decompose the <strong>Application</strong>4. Identify the <strong>Threats</strong>5. Document the <strong>Threats</strong>6. Rate the <strong>Threats</strong>Figure 3.1An overview of the threat modeling process

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!