You are viewing an old version of this page. View the current version.

Compare with Current View Page History

« Previous Version 2 Current »

You should ensure that your architecture is secure. Creating a threat model is the best way of getting an overview of your security. A threat model gives you an overview of the security risks, mitigations and the accepted risks. It will list the segregation of the application and infrastructure components.

The threat model contains four steps:

  1. Draw your architecture model
  2. Identify your trust boundaries
  3. Identify the theoretical and real security risks
  4. Describe mitigations for each security risk and register the accepted risks
  • No labels