Web application security - the fast guide Chapter 3: Vulnerabilities And Threat Models | Page 6

Decompose the application App . 4 Decompose the application identifying trust boundaries Identifying data flow Identify entry points Identify privileged code Document the security profile (input validation, authentication, authorization, configuration management, session management, Cryptography, parameters manipulation, exception management and logging) 2017-05-10 Web Application Security Fast Guide (book slides) By Dr.Sami Khiami Slide 6