Files
odo/.threatmodel/THREAT_MODELING.md
2022-07-01 07:12:53 +00:00

770 B

ODO Threat Model

The Threat model was developed using the OWASP Threat Dragon tool.

There are two installation variants of the OWASP Threat Dragon, a web application and a desktop application. Follow the link for installation instructions. The OWASP Threat dragon saves the threat model as a json file. The odo threat model is defined in the odo-model.json file

OWASP Top Ten

The OWASP Org, provides a list of the Top Ten application security risks. Read through them to undestand each of the risks, how to prevent them along with some examples.