From the course: Practical Secure by Design: Threat Modeling to Build Resilient Products

Unlock this course with a free trial

Join today to access over 24,900 courses taught by industry experts.

Insecure implementation: Real examples of default pitfalls

Insecure implementation: Real examples of default pitfalls

- [Instructor] As we have seen in our previous video, we have gone through the scope for user's API and checkout API, and understood a little bit about what the APIs do. We also realized, as we were going through the documents, we applied a security mindset and already identified a couple of issues that may be exploited. Because this is an insecure implementation, I want to go ahead and use the API documentation that was provided to us by the engineers and potentially test some of these scenarios. Please note, in real life, normally threat modeling is done quite early in the design phase of PDLC. However, sometimes security teams may not be involved quite early in the PDLC, and by the time you start your threat model, you may already have access to the code. When you have access to the code, I highly recommend to make use of the code and make use of the test documentation to go ahead and run the application and do a…

Contents