description |
---|
The Role of Application Architecture Planning for Authentication, Authorization, and Controls |
A holistic view of the structure of the application, on how the different components, database, APIs, and third-party libraries interact within the code under the lens of maintainability, performance at scale, re-usability, flexibility, cyber security, and data privacy.
Planning for Authentication, Authorization, and Controls
- Introduction & Objectives
- Scope of Work
- Methodology Review
-
- Threat Modeling: STRIDE, VAST, and other approaches
- Deployment and Infrastructure Considerations
-
- The design identifies, understands, and accommodates the company security policy.
- Restrictions imposed by infrastructure security (including available services, protocols, and firewall restrictions) are identified.
- The design addresses the required scalability and performance criteria.
- The design identifies the deployment infrastructure requirements and the deployment configuration of the application.
- Architecture and Design Considerations
-
- Input Validation
- Authentication
- Authorization
- Configuration Management
- Sensitive Data
- Session Management
- Cryptography
- Parameter Manipulation
- Exception Management
- Auditing and Logging
\
- Controls Review
-
- Operations Controls
- Management Controls
Technical Controls\