Software Security Touchpoints
Last updated
Last updated
Code review (Tools)
Architectural risk analysis.
Penetration testing.
Risk-based security testing.
Abuse cases (thinking like an attacker).
Security requirements.
Security operations (not only at software level).
Similar to Threat Modelling
Designers and architects provide a high-level view of the target system and documentation for assumptions and identify possible attacks.
McGraw proposes 3 main steps for risk analysis:
Attack resistance analysis (explore known threats).
Ambiguity analysis (discover new risks).
Weakness analysis (explore 3rd party assumptions).