Integrate a secure engineering framework into any software development lifecycle
Create Trusted Subsystems by
- Using secure software designs that are proven in the field
- Determining and setting default secure settings
- Designing a secure deployment framework
Adapt to Evolving Threats by
- Inspecting OWASP Top 10 security issues
- Modelling Common Attack Patterns (CAPEC)
- Factoring Common weaknesses (CWE)
Mitigate discovered threats using
- STRIDE threat modelling taxonomy
- Security Frame taxonomy analysis
- The Artis-Secure privacy frame for data inspection