Главная
Study mode:
on
1
intro
2
about jags
3
expectations
4
threat modelling
5
misconceptions about tm
6
agile threat modelling
7
owasp juice shop
8
before starting...
9
example: security objective
10
what do we want to accomplish? - scoping
11
example: scoping
12
what are we building? software-centric approach
13
example: data flow diagram
14
what can go wrong? - evil brainstorming
15
methodology. No 'best' way
16
spoofed identity
17
tampering with input
18
repudiation of action
19
information disclosure
20
denial of service
21
elevation of privilege
22
example: applying stride
23
what are we going to do about it? - prioritize
24
example: prioritize
25
mitigation
26
example: mitigation
27
did we do a good job? - reflect...
28
iterative threat modelling ...and repeat
29
ways of running the workshop
30
learn more
31
threat modelling in software development lifecycle
32
what was the mnemonic again?!?!
33
takeaways
Description:
Explore iterative threat modeling techniques for enhancing security in agile development processes in this conference talk from Conf42 DevSecOps 2023. Gain insights into common misconceptions about threat modeling, learn how to apply agile principles to security practices, and understand the STRIDE methodology for identifying potential threats. Discover practical examples using the OWASP Juice Shop project, covering key steps such as defining security objectives, scoping, creating data flow diagrams, and prioritizing risks. Delve into mitigation strategies, reflection techniques, and various workshop formats for implementing threat modeling in your software development lifecycle. Walk away with valuable takeaways and resources to further your knowledge in this critical aspect of DevSecOps.

Iterative Threat Modelling - Security in Agile Development

Conf42
Add to list