Additional Vulnerability Assessment Tools
Trust Boundaries
During the systemic analysis, several areas are closely assessed or used as assessment guidelines. For example, the different relationships among the items in the model can provide clues about vulnerabilities along the boundaries they share and their interfaces. A boundary type of particular concern would be a trust boundary. That is the boundary between modules with differing levels or domains of trust.
The most obvious type of trust boundary is the external trust boundary. This is the boundary between different systems or a system and external inputs. Neither side of an external trust boundary should trust the other. Limiting the places where trust boundaries are crossed or interface ...
Get Secure Software Systems now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.