Advanced Search

Save Or Share This Report

For Application Development & Delivery Professionals

Use Threat Modeling To Develop More-Secure Applications

The Payoff Is High For Avoiding Security Vulnerabilities During Development

March 10, 2009

Primary author headshot

Authors

Why Read This Report

Many application architects and developers don't know enough about developing secure applications. Worse, many of them have a naive notion of application security that lulls them into thinking they have all the security bases covered. This means that security and risk professionals often uncover security vulnerabilities late in the software development life cycle — or, heaven forbid, the vulnerabilities become a feature story on the front page of The Wall Street Journal. The later security holes are detected, the more it costs to plug them. The solution is to avoid security vulnerabilities as early as possible by employing principles of secure design such as threat modeling. Developers and auditors can use code analysis tools such as Coverity Prevent, Fortify 360, and Ounce Labs' Ounce to uncover familiar vulnerabilities such as buffer overflows and SQL injection. But these tools are only part of the solution; developers should also do threat modeling on new and existing applications. Microsoft's SDL Threat Modeling Tool is a unique new tool that helps developers identify and mitigate security risks to make applications more secure from the get-go.

Get Access

Already a Client?

Log in to read this document.

Become a Forrester Client

Timely and relevant, Forrester's RoleView research aligns to 13 leadership roles across business and technology management. Our expertise in customer experience, mobile, digital business, and big data will help your teams win in the age of the customer. Contact us to learn more.

Purchase Report

This report is available for individual purchase ($2495 USD).

Purchase

Table of Contents

  • You Must Develop More-Secure Applications
  • Threat Modeling Is Essential To Making Applications Secure
  • Speed Threat Modeling With A Tool-Enabled, Four-Step Process
  • RECOMMENDATIONS

  • Model Threats To Develop More-Secure Applications
  • WHAT IT MEANS

  • More Threat Modeling Tools Will Help Developers Take The Lead
  • Related Research Documents

Recommended Research