Improving Web Application Security: Threats and Countermeasures

Different parts of the guide apply to the different phases of the product development life cycle. The sequence of chapters in the guide mirrors the typical phases of the life cycle. The chapter-to-role relationship is shown in Figure 5.

Figure 5: Relationship of chapter to product life cycle

Note  

Threat modeling and security assessment ( specifically the code review and deployment review chapters) apply when you build new Web applications or when you review existing applications.

Категории