Главная
Study mode:
on
1
Introduction
2
Who does threat modeling
3
Why not threat modeling
4
AppSec 6 study
5
DevOps
6
Threat Modeling
7
The Easy Stuff
8
Conscious Compromise
9
Template
10
OSVS
11
Risk Rating
12
Problems
13
Components
14
Users Perspective
15
Threat Models
16
countermeasures
17
Authentication
18
Generic Patterns
19
SSH Service
20
Building a Library
21
Inheritance System
22
Two Problems
23
Solutions
24
Rules Engine
25
Shortcut
26
Advantages
27
SD Elements
Description:
Explore threat modeling with architectural risk patterns in this AppSecUSA 2016 conference talk. Learn about a software-centric approach that uses risk patterns to increase efficiency and consistency in threat modeling. Discover how this method can be implemented through tooling to automatically generate threat models based on architectural decisions. Understand the application of object-oriented software design principles like inheritance and method overloading to maintain and extend pattern contents. Gain insights into extracting expertise from software security experts for reusable threat modeling knowledge within organizations. The talk covers topics such as the challenges of manual threat modeling, scaling the process in enterprise environments, and addressing the lack of security skills in smaller companies. Delve into incremental improvements in risk pattern usage, from simple checklists to flexible rules engines, and learn how this approach can support security in the software development lifecycle. Read more

Threat Modeling With Architectural Risk Patterns

OWASP Foundation
Add to list
0:00 / 0:00