Right from the start, until the application is being used in production, it's exposed to different kinds of threats. These different kinds of threats can break the application from being successfully used. Therefore, it is important to address the threats.
Understanding Threat Model and OWASP
Threat Model
The approach to identify and classify, and the process of addressing the threats is called Threat Modelling. The outcome of this process is a Threat Model. This process is not merely related to code review, following coding standards, or deployment processes.
Threat Modelling comprises more of analyzing the security of an application, and it's more result-oriented when it starts in the early stages of SDLC. The...