This WASC Threat Classification view was created to loosely outline where in the development lifecycle a particular type of vulnerability is likely to be introduced. This view was created in an attempt identify common root occurrences/development phases for vulnerability introduction, and does not attempt to address improperly patched servers, or enumeration of edge cases. This view makes use of many to many relationships.
Design: Covers vulnerabilities that are likely to be introduced due to a lack of mitigations specified in the software design/requirements, or due to a poorly/improperly defined design/requirement.
Implementation: Covers vulnerabilities that are likely to be introduced due to a poor choice of implementation.
Deployment: Covers vulnerabilities that are likely to be introduced due to poor deployment procedures, or bad application/server configurations.
Insert links to other pages or uploaded files.
Tip: To turn text into a link, highlight the text, then click on a page or file from the list above.
Comments (0)
You don't have permission to comment on this page.