Excerpt |
---|
Status: DRAFT |
Resources:
- https://jackrabbit.apache.org/oak/docs/security/authorization/bestpractices.html#Threat_Model
- https://en.wikipedia.org/wiki/STRIDE_(security)
- https://shostack.org/resources/whitepapers/threat-modeling-what-why-how
- https://owasp.org/www-community/Threat_Modeling
- https://owasp.org/www-community/Threat_Modeling_Process