Главная
Study mode:
on
1
Introduction
2
What is architecture
3
What is architectural risk analysis
4
Insecure design
5
Threat modelling
6
Shifting security left
7
Architecture challenges
8
Software development vs manufacturing
9
Software development is art
10
Continuous iterative revisionist design
11
Canvas framework
12
Warding map
13
Continuous iterative revisionist
14
Infrastructure as code
15
Open threat model format
16
Potential use cases
17
Open specification
18
Object attributes
19
Key differences
20
Unique Identifiers
21
Representations
22
Application Code
23
Trust Zones
24
Components
25
Data Flow
26
Threats
27
Mitigations
28
Component
29
Demo
Description:
Explore the automation of architectural risk analysis using the Open Threat Model format in this 47-minute OWASP Foundation conference talk by Fraser Scott, VP of Product at IriusRisk. Delve into the challenges of manual security workshops and discover how Infrastructure as Code can streamline the process. Learn about the Open Threat Model (OTM) format and its implementation in DevSecOps workflows. Gain insights into architectural risk analysis, threat modeling, and shifting security left in software development. Examine the differences between software development and manufacturing, and understand the continuous iterative revisionist design approach. Discover practical applications of the OTM format, its key features, and potential use cases through a comprehensive demonstration.

Automating Architectural Risk Analysis with Open Threat Model Format

OWASP Foundation
Add to list