Skip to content

Commit

Permalink
reorg of folder for IriusRisk
Browse files Browse the repository at this point in the history
  • Loading branch information
jmarcil committed Jun 7, 2019
1 parent 635d2b3 commit 09a8fa7
Show file tree
Hide file tree
Showing 8 changed files with 21 additions and 19 deletions.
@@ -1,19 +1,19 @@
# Example of a Threat Model of a fictitious 3 Tier Web Application

This fictitious application exposes a Web UI on the internet and has a Web API and Database hosted on a public cloud provider.

## Contents
### What are we building?
- See the Dataflow Diagram.png
- The first few pages of the Threat Model and Risk Report PDF file contain the answers to questions that define how the individual components behave and are configured.

### What can go wrong?
- See the Table of Threats
- The last section of the PDF report contains a table of threats, the planned mitigation and the status of the countermeasure progress

### What are we going to do about it?
- The last section of the PDF report contains a table that describes how each of the threats are going to be mitigated (if at all).
- In the same PDF report, the "Risks Accepted" table describes risks that are not going to be mitigated.

### Did we do a good job?
# Example of a Threat Model of a fictitious 3 Tier Web Application

This fictitious application exposes a Web UI on the internet and has a Web API and Database hosted on a public cloud provider.

## Contents
### What are we building?
- See the Dataflow Diagram.png
- The first few pages of the Threat Model and Risk Report PDF file contain the answers to questions that define how the individual components behave and are configured.

### What can go wrong?
- See the Table of Threats
- The last section of the PDF report contains a table of threats, the planned mitigation and the status of the countermeasure progress

### What are we going to do about it?
- The last section of the PDF report contains a table that describes how each of the threats are going to be mitigated (if at all).
- In the same PDF report, the "Risks Accepted" table describes risks that are not going to be mitigated.

### Did we do a good job?
- This is not answered by an output from this threat modeling tool.
Binary file not shown.
Binary file not shown.
3 changes: 3 additions & 0 deletions IriusRisk/README.md
@@ -0,0 +1,3 @@
Examples using the IriusRisk threat modeling tool from ContinuumSecurity.

https://continuumsecurity.net/threat-modeling-tool/
1 change: 0 additions & 1 deletion samples/README.md

This file was deleted.

0 comments on commit 09a8fa7

Please sign in to comment.