handbook/templates/PASTA.md
2024-08-30 14:45:22 +02:00

3.6 KiB
Raw Blame History


Stages Sneaker company
I. Define business and security objectives Make 2-3 notes of specific business requirements that will be analyzed.

- Will the app process transactions?

- Does it do a lot of back-end processing?

- Are there industry regulations that need to be considered?
II. Define the technical scope List of technologies used by the application:

- Application programming interface (API)

- Public key infrastructure (PKI)

- SHA-256

- SQL




Write 2-3 sentences (40-60 words) that describe why you choose to prioritize that technology over the others.
III. Decompose application Sample data flow diagram
IV. Threat analysis List 2 types of threats in the PASTA worksheet that are risks to the information being handled by the application.

- What are the internal threats?

- What are the external threats?
V. Vulnerability analysis List 2 vulnerabilities in the PASTA worksheet that could be exploited.

- Could there be things wrong with the codebase?

- Could there be weaknesses in the database?

- Could there be flaws in the network?
VI. Attack modeling Sample attack tree diagram
VII. Risk analysis and impact List 4 security controls that youve learned about that can reduce risk.