How are we Categorizing the Threats?
Threats are categorized based on the below ares:
Authentication
Authorization
Auditing & Logging
Configuration Management
Cryptography
Exception Management
Input Validation
Sensitive Data
Communication Security
Last updated