How are we Categorizing the Threats?

Threats are categorized based on the below ares:

  • Authentication

  • Authorization

  • Auditing & Logging

  • Configuration Management

  • Cryptography

  • Exception Management

  • Input Validation

  • Sensitive Data

  • Communication Security

Last updated