Threats are categorized based on the below ares:
Authentication
Authorization
Auditing & Logging
Configuration Management
Cryptography
Exception Management
Input Validation
Sensitive Data
Communication Security
Last updated 1 year ago