11.07.2015 Views

Improving Web Application Security: Threats and - CGISecurity

Improving Web Application Security: Threats and - CGISecurity

Improving Web Application Security: Threats and - CGISecurity

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

liv<strong>Improving</strong> <strong>Web</strong> <strong>Application</strong> <strong>Security</strong>: <strong>Threats</strong> <strong>and</strong> CountermeasuresApplying the Guidance to Your Product Life CycleDifferent parts of the guide apply to the different phases of the product developmentlife cycle. The sequence of chapters in the guide mirrors the typical phases of the lifecycle. Figure 2 shows how the parts <strong>and</strong> chapters correspond to the phases of a classicproduct development life cycle.RequirementsGatheringArchitecture <strong>and</strong>Design ReviewDesignThreat Modeling <strong>and</strong>Part II, Designing Secure<strong>Web</strong> <strong>Application</strong>sCode ReviewDevelopmentPart III, Building Secure<strong>Web</strong> <strong>Application</strong>sPart V, AssessingYo ur <strong>Security</strong>TestingDeploymentReviewDeploymentMaintenancePart IV, SecuringYour Network, Host<strong>and</strong> <strong>Application</strong>Figure 2<strong>Improving</strong> <strong>Web</strong> <strong>Application</strong> <strong>Security</strong>: <strong>Threats</strong> <strong>and</strong> Countermeasures as it relates to product lifecycle

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!