continuous-threat-modeling icon indicating copy to clipboard operation
continuous-threat-modeling copied to clipboard

A Continuous Threat Modeling methodology

Results 4 continuous-threat-modeling issues
Sort by recently updated
recently updated
newest added

fixes a small typo where a closing emphasis and a blank were swapped

Threat Modeling, in the best case, should be performed before you implement the feature/component/service/application. Therefore, I suggest to change it to future. The text beforehand is neutral, so no changed...

* Reference ISO27001 * External reference on tainting and session fixation * Add not on timestamps being timezone aware

...of the second bullet point of the 'first steps' section. Current formatting: ![current-formatting](https://github.com/user-attachments/assets/0738fe7d-4ccf-446f-be10-c4ff7d8fd22c) Proposed formatting: ![proposed-formatting](https://github.com/user-attachments/assets/f9039274-0bdb-45d6-be34-cc6e64e2ea4b)