Web application security - the fast guide 1.1 | Page 49
Chapter 3 - Vulnerabilities and threat models
P a g e | 49
The output of this step is an architecture diagram along with list of used
technologies and versions.
3. Decompose the application: this step is about having better
understanding and identifying what are the data consumed by
application and where it comes from, who it will be accessed this is
done through:
a. identifying trust boundaries.
b. Identifying data flow
c. Identify entry points
d. Identify privileged code
e. Document the security profile including how the application
deals with (input validation, authentication, authorization,
configuration
management,
session
management,
Cryptography,
parameters
manipulation,
exception
management and logging.
4. Identifying and rating threats:
This task can be a little difficult because it needs lot of experience this
is why we normally use special methods and schemes to facilitate
categorizing and rating different threats.
From the common schemes we mention STRIDE, IIMF, DREAD, CVSS,
CIA
STRIDE
IIMF
Threats and
vulnerabilities models
CVSS
CIA
Figure 20: Threats and vulnerabilities models
DREAD