Application Threat Modelling
Application Threat Modelling
Application threat modelling to identify the business security risks and security
vulnerabilities should be undertaken at the project definition stage but may be
undertaken later in the software lifecycle when no model exists. Threat modelling
is also usually undertaken as part of security due diligence reviews to better
understand the business risks involved with application before going live on to
production. Threat modelling should be a structured technique that
systematically identifies threats, attacks, vulnerabilities and possible
countermeasures to mitigate the risks. Approach is usually based on an asset,
threat or compliance technique, to suit the business requirements.
Any Web Application which has any form of user interaction will include all of
these potential categories.
Vulnerability Assessments
Vulnerability assessment or audit is the process of identifying and quantifying
vulnerabilities in a web application or website using scanning and testing
methods. Vulnerability assessment is usually undertaken as part of web risk
assessments during the project definition stage or as a result of penetration
testing of an existing website or web application.
Threats first
The threats related to a web application are similar to other software, but by
their nature user-access is more widespread and less controlled. An initial
identification of security threats should be undertaken prior to identifying the
vulnerabilities.
Vulnerability consequences
A vulnerability assessment or audit should consider the effects of each identified
vulnerability on all assets (possibly identified during threat modelling) within the
scope of the review. Where possible, methods and techniques to remove or
reduce the effects of the vulnerability should be identified in order to minimise or
eliminate the business risk.