Use Threat Modeling To Develop More-Secure Applications
The Payoff Is High For Avoiding Security Vulnerabilities During Development
March 10, 2009
Why Read This Report
Many application architects and developers don't know enough about developing secure applications. Worse, many of them have a naive notion of application security that lulls them into thinking they have all the security bases covered. This means that security and risk professionals often uncover security vulnerabilities late in the software development life cycle — or, heaven forbid, the vulnerabilities become a feature story on the front page of The Wall Street Journal. The later security holes are detected, the more it costs to plug them. The solution is to avoid security vulnerabilities as early as possible by employing principles of secure design such as threat modeling. Developers and auditors can use code analysis tools such as Coverity Prevent, Fortify 360, and Ounce Labs' Ounce to uncover familiar vulnerabilities such as buffer overflows and SQL injection. But these tools are only part of the solution; developers should also do threat modeling on new and existing applications. Microsoft's SDL Threat Modeling Tool is a unique new tool that helps developers identify and mitigate security risks to make applications more secure from the get-go.
Already a Client?
Log in to read this document.
Become a Forrester Client
Timely and relevant, Forrester's RoleView research aligns to 13 leadership roles across business and technology management. Our expertise in customer experience, mobile, digital business, and big data will help your teams win in the age of the customer. Contact us to learn more.
This report is available for individual purchase ($2495 USD).Purchase
Table of Contents
- You Must Develop More-Secure Applications
- Threat Modeling Is Essential To Making Applications Secure
- Speed Threat Modeling With A Tool-Enabled, Four-Step Process
- Model Threats To Develop More-Secure Applications
WHAT IT MEANS
- More Threat Modeling Tools Will Help Developers Take The Lead
- Related Research Documents