continuous-threat-modeling
continuous-threat-modeling copied to clipboard
A Continuous Threat Modeling methodology
fixes a small typo where a closing emphasis and a blank were swapped
Threat Modeling, in the best case, should be performed before you implement the feature/component/service/application. Therefore, I suggest to change it to future. The text beforehand is neutral, so no changed...
* Reference ISO27001 * External reference on tainting and session fixation * Add not on timestamps being timezone aware
...of the second bullet point of the 'first steps' section. Current formatting:  Proposed formatting: 