Skip to content

Commit 47b4448

Browse files
authored
Merge pull request #10 from lina-gail/patch-1
Update 04-TASVS-ARCH.md
2 parents 1501d0d + 3ac50a8 commit 47b4448

File tree

1 file changed

+8
-8
lines changed

1 file changed

+8
-8
lines changed

document/1.0/04-TASVS-ARCH.md

Lines changed: 8 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -11,7 +11,7 @@ Architecture and threat modeling are inextricably linked. Threat modeling inform
1111
| ---- | ------------- | - | - | - |
1212
| TASVS-ARCH-1 | Threat Modeling | | | |
1313
| TASVS-ARCH-1.1 | Completed a low fidelity threat model for thick client. | X | X | X |
14-
| TASVS-ARCH-1.2 | Completed a high fidelity threat model for thick client which is in currently in production. | | X | X |
14+
| TASVS-ARCH-1.2 | Completed a high fidelity threat model for thick client which is currently in production. | | X | X |
1515
| TASVS-ARCH-1.3 | Threat model includes server-side components and dependencies (cloud APIs, OIDC provider, file storage, etc.). | | X | X |
1616
| TASVS-ARCH-1.4 | Threat modeling process included all phases (system modeling, auto-threat identification, manual threat identification, threat mitigation). | | X | X |
1717
| TASVS-ARCH-1.5 | Threat model checked-in to source code repository. | X | X | X |
@@ -35,13 +35,13 @@ Recommended "Low Fidelity" baseline:
3535

3636
That's it! Later, continue to elaborate the model and raise fidelity score. Remember the system model is a means to an end - identifying threats.
3737

38-
### TASVS-ARCH-1.2 - Completed a high fidelity threat model for thick client which is in currently in production.
38+
### TASVS-ARCH-1.2 - Completed a high fidelity threat model for thick client which is currently in production.
3939

40-
"high fidelity" threat modeling is a more detailed and comprehensive approach to threat modeling. It includes all the elements of a low-fidelity model but adds more detail and context to the model. This includes:
40+
"High fidelity" threat modeling is a more detailed and comprehensive approach to threat modeling which maximizes threat identification. High fidelity is appropriate for a production product where all aspects of the system are well-understood. It includes all the elements of a low fidelity model but adds additional detail and context to the model. This includes:
4141

42-
- Detailed data flow diagrams
43-
- Detailed trust boundaries
44-
- Detailed threat identification
42+
- Define data assets processed and stored on technical assets
43+
- Define data assets flowing on communication links
44+
- Optional attributes defined on data assets and technical assets
4545

4646
### TASVS-ARCH-1.3 - Threat model includes server-side components and dependencies (cloud APIs, OIDC provider, file storage, etc.).
4747

@@ -58,7 +58,7 @@ The threat model should be checked into the source code repository to ensure tha
5858

5959
### TASVS-ARCH-1.6 - Threat model updated regularly as part of a documented process within development team's SSDLC.
6060

61-
The threat model should be updated regularly as part of a documented process within the development team's SSDLC. This ensures that the threat model remains current and relevant as the thick client evolves and new threats emerge. Regular updates to the threat model help to ensure that the thick client remains secure and resilient to potential threats.
61+
The threat model should be updated regularly as part of a documented process within the development team's secure software development lifecycle (SSDLC). This ensures that the threat model remains current and relevant as the thick client evolves and new threats emerge. Regular updates to the threat model help to ensure that the thick client design remains secure and resilient to potential threats.
6262

6363

64-
\newpage{}
64+
\newpage{}

0 commit comments

Comments
 (0)