Summary
This chapter introduced the secure system model. We looked at partitioning our application into separate units that communicate together. Next, we looked at patterns in software development that can assist with our system model. We introduce UML component diagrams to model the partitions and their external interfaces. We concluded the chapter by implementing our work into an example system model for an event ticketing system.
The next chapter will look at building threat models to represent the vulnerabilities in our application’s dynamic activity.