Save or Share this Report

For Application Development & Delivery Professionals

Use Threat Modeling To Develop More-Secure Applications

The Payoff Is High For Avoiding Security Vulnerabilities During Development

March 10, 2009

Primary author headshot


Why Read This Report

Many application architects and developers don't know enough about developing secure applications. Worse, many of them have a naive notion of application security that lulls them into thinking they have all the security bases covered. This means that security and risk professionals often uncover security vulnerabilities late in the software development life cycle — or, heaven forbid, the vulnerabilities become a feature story on the front page of The Wall Street Journal. The later security holes are detected, the more it costs to plug them. The solution is to avoid security vulnerabilities as early as possible by employing principles of secure design such as threat modeling. Developers and auditors can use code analysis tools such as Coverity Prevent, Fortify 360, and Ounce Labs' Ounce to uncover familiar vulnerabilities such as buffer overflows and SQL injection. But these tools are only part of the solution; developers should also do threat modeling on new and existing applications. Microsoft's SDL Threat Modeling Tool is a unique new tool that helps developers identify and mitigate security risks to make applications more secure from the get-go.

Get Access

Already a Client?

Log in to read this document.

Become a Forrester Client

Customers are the new market-makers, reshaping industries and changing how businesses compete and win. Success depends on how well and how fast you respond. Forrester Research gives you insights and frameworks aligned to your role to shorten the time between a great idea and a great outcome, helping your teams win in the age of the customer. Contact us to learn more.

Purchase Report

This report is available for individual purchase ($2495 USD).


Table of Contents

  • You Must Develop More-Secure Applications
  • Threat Modeling Is Essential To Making Applications Secure
  • Speed Threat Modeling With A Tool-Enabled, Four-Step Process

  • Model Threats To Develop More-Secure Applications

  • More Threat Modeling Tools Will Help Developers Take The Lead
  • Related Research Documents

Recommended Research