Files
odo/.threatmodel/THREAT_MODELING.md
2022-07-01 07:12:53 +00:00

12 lines
770 B
Markdown

# ODO Threat Model
The Threat model was developed using the [OWASP Threat Dragon](https://owasp.org/www-project-threat-dragon/) tool.
There are [two installation variants of the OWASP Threat Dragon](https://threatdragon.github.io/install/), a web application and a desktop application. Follow the link for installation instructions.
The OWASP Threat dragon saves the threat model as a json file. The odo threat model is defined in the [odo-model.json](https://github.com/redhat-developer/odo/blob/main/.threatmodel/odo-model.json) file
# OWASP Top Ten
The OWASP Org, provides a list of the [Top Ten application security risks](https://owasp.org/www-project-top-ten/). Read through them to undestand each of the risks, how to prevent them along with some examples.