This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org
Difference between revisions of "Threat Modeling Cheat Sheet"
From OWASP
m |
|||
Line 1: | Line 1: | ||
+ | __NOTOC__ | ||
+ | <div style="width:100%;height:160px;border:0,margin:0;overflow: hidden;">[[File:Cheatsheets-header.jpg|link=]]</div> | ||
+ | |||
+ | {| style="padding: 0;margin:0;margin-top:10px;text-align:left;" |- | ||
+ | | valign="top" style="border-right: 1px dotted gray;padding-right:25px;" | | ||
+ | Last revision (mm/dd/yy): '''{{REVISIONMONTH}}/{{REVISIONDAY}}/{{REVISIONYEAR}}''' | ||
+ | <br/> | ||
+ | __TOC__{{TOC hidden}} | ||
+ | = Introduction = | ||
+ | |||
= DRAFT CHEAT SHEET - WORK IN PROGRESS = | = DRAFT CHEAT SHEET - WORK IN PROGRESS = | ||
= Introduction = | = Introduction = | ||
Line 43: | Line 53: | ||
=== Periodically retest risk === | === Periodically retest risk === | ||
− | = | + | == Authors and Primary Editors == |
+ | |||
+ | TODO | ||
− | + | == Other Cheatsheets == | |
+ | {{Cheatsheet_Navigation_Body}} | ||
[[Category:Cheatsheets]] | [[Category:Cheatsheets]] |
Revision as of 22:12, 26 February 2016
Last revision (mm/dd/yy): 02/26/2016
IntroductionDRAFT CHEAT SHEET - WORK IN PROGRESSIntroductionApplication Security Threat Modeling StepsDefine The Target Of EvaluationCreate a logical map of the Target of EvaluationCreate a physical map of the Target of EvaluationIdentify the Assets within the physical and logical Targets of EvaluationDefine The AttackersIdentify Possible Attackers that could exist within the Target Of Evaluation
Select the most dangerous Attacker in your Target Of EvaluationConduct the Threat Model
Enumerate Threats posed by most dangerous Attacker in Target of EvaluationEnumerate Threats posed by most dangerous attacker in designated areas of the physical & logical Maps of the Target of Evaluation
Enumerate Attacks posed by most dangerous attacker in designated areas of the logical and physical maps of the target of evaluation
- Application Decomposition - Attack Tree - Vulnerability/Exploit Mapping - Application Testing create risks in risk log for every identified threat or attack to any assetsrank risks using risk matrix from most severe to least severeIdentify risk ownersRemediation/CountermeasuresAgree on risk mitigation with risk owners and stakeholders
Treat risks accordinglyTest risk treatment to verify remediationReduce risk in risk log for verified treated riskPeriodically retest riskAuthors and Primary EditorsTODO Other Cheatsheets |