Главная
Study mode:
on
1
Introduction
2
Selection of Methodology
3
Application Threat Modeling Frameworks
4
Application Threat Modeling Scope
5
Asset Identification
6
Application Architecture
7
Communication
8
Data Flow Diagram
9
Web Application Data
10
Client Side Code
11
Connection Flow
12
Logical Flow
13
Dataflow Diagram
14
Threat Identification
15
Threat Libraries
16
Continuous Threat Modeling
17
Stride
18
Tips
19
Thread Traceability
20
Understanding Threat Agents
21
Risk Analysis
Description:
Explore essential knowledge and valuable tips for designing and implementing application threat modeling in this 51-minute OWASP Foundation talk by Mohamed Alfateh. Learn structured approaches to identify, quantify, and address security risks throughout the SDLC process. Discover best practices for creating data flow diagrams (DFDs) for advanced scenarios, including microservices architecture and client-side frameworks. Gain insights into analyzing DFDs to uncover logical threats, selecting appropriate methodologies, and leveraging threat modeling frameworks. Cover topics such as asset identification, application architecture, communication flows, threat libraries, and risk analysis. Enhance your ability to conduct continuous threat modeling and understand threat agents to improve overall application security.

Application Threat Modeling Implementation Tips and Tricks

OWASP Foundation
Add to list
0:00 / 0:00