11.07.2015 Views

Improving Web Application Security: Threats and - CGISecurity

Improving Web Application Security: Threats and - CGISecurity

Improving Web Application Security: Threats and - CGISecurity

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Fast Track — How To Implement the Guidance lxxxi6. Rate the threats.Rate the threats to prioritize <strong>and</strong> address the most significant threats first. Thesethreats are the ones that present the biggest risk. The rating process weighs theprobability of the threat against the damage that could result should an attackoccur. It might turn out that certain threats do not warrant any action when youcompare the risk posed by the threat with the resulting mitigation costs.Applying the Guidance to Your Product Life CycleDifferent parts of the guide apply to the different phases of the product developmentlife cycle. The sequence of chapters in the guide mirrors the typical phases of the lifecycle. The chapter-to-role relationship is shown in Figure 5.RequirementsGatheringArchitecture <strong>and</strong>Design ReviewDesignThreat Modeling <strong>and</strong>Part II, Designing Secure<strong>Web</strong> <strong>Application</strong>sCode ReviewDevelopmentPart III, Building Secure<strong>Web</strong> <strong>Application</strong>sPart V, AssessingYo ur <strong>Security</strong>TestingDeploymentReviewDeploymentMaintenancePart IV, SecuringYour Network, Host<strong>and</strong> <strong>Application</strong>Figure 5Relationship of chapter to product life cycleNote Threat modeling <strong>and</strong> security assessment (specifically the code review <strong>and</strong> deployment reviewchapters) apply when you build new <strong>Web</strong> applications or when you review existing applications.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!