Overview
Syllabus
Introduction
What is architecture
What is architectural risk analysis
Insecure design
Threat modelling
Shifting security left
Architecture challenges
Software development vs manufacturing
Software development is art
Continuous iterative revisionist design
Canvas framework
Warding map
Continuous iterative revisionist
Infrastructure as code
Open threat model format
Potential use cases
Open specification
Object attributes
Key differences
Unique Identifiers
Representations
Application Code
Trust Zones
Components
Data Flow
Threats
Mitigations
Component
Demo
Taught by
OWASP Foundation