Module 7 — Authentication, Authorization, and Application Security
Lesson 2 — Threat Modeling Practice
Unit 3 — Abuse Resistance and Threat Modeling
Not finished yet
Topics
- Identify protected assets
- Identify relevant actors
- Identify system entry points
- Identify trust boundaries
- Write abuse cases for a backend system