Part 1: Modeling a Secure Application
The first part of this book drills into modeling a secure application so we can identify the risks to our application before we start our implementation. The process is iterative, so we’ll revisit previous models as we add knowledge about new models.
This part has the following chapters:
- Chapter 1, Security Principles and Procedures
- Chapter 2, Designing a Secure Functional Model
- Chapter 3, Designing a Secure Object Model
- Chapter 4, Designing a Secure Dynamic Model
- Chapter 5, Designing a Secure System Model
- Chapter 6, Threat Modeling