Sample Report - Threat Model
Sample Report - Threat Model
Table of Contents
1.0 Executive Summary ............................................................................................ 3 2.0 Features ............................................................................................................. 3 3.0 Individual Threats ............................................................................................... 3 4.0 Threat Model Overview ....................................................................................... 3 5.0 Threat Trees ....................................................................................................... 4 6.0 Threat Escalation Model ..................................................................................... 7
2.0 Features
Authenticated access Authorized access To customer features To application admin features Sensitive data integrity is protected Credentials Confidential information (credit card information) Data integrity is protected user database cannot be tampered with general information (billing address etc) is protected
Inject commands
Overflow buffers
and
and
and
Inject commands
Overflow buffers
Error messages at login time divulge too much information
and Perform SQL injection attacks Perform OS command injection attacks Remove client-side validation Perform long string injection attacks
Perform SQL injection attacks Perform OS command injection attacks