Please enable JavaScript.
Coggle requires JavaScript to display documents.
Threat Modeling (Why impt? (better coverage in testing (testing all the…
Threat Modeling
-
Heavy-weight
How to do it?
modeler
1) doc each component
2) Develop data flow diagrams, show how components interact
3) Privileges boundaries identified, ensure proper controls are in place for any data crossing these boundaries
-
-
-
-
-