Skip to main content

Software Architecture Review

Updated over 5 months ago

Service Overview

The Software Architecture Review, also referred to as Application Threat Modeling, is a structured evaluation of the high-level applicative architecture of a planned or existing system. The objective is to map potential threats, assess the associated risks, and provide actionable recommendations to improve the system's security posture.


Methodology

This activity supports defense-in-depth and secure-by-design practices by identifying hidden vulnerabilities, design flaws, and implementation errors that are hard or impossible to detect through standard penetration testing.


Deliverables

Following the assessment, the client receives a report that includes:

  • Executive Summary

  • Application Introduction

  • Potential Findings

  • Verified Findings

  • Attack Scenarios


Prerequisites

To begin the assessment, the following information is required:

  • General system description, including a list of roles and user types

  • High-level architecture diagram

  • Known threats or probable attack scenarios (if available)


Customer Engagement

Client participation involves:

  • Two meetings during the first week for a guided review of the system’s architecture

  • A total of 5 to 7 meetings, each approximately one hour

  • Availability of the system manager and/or a senior R&D team member for these sessions


Relevant Standards

The methodology is based on the following standards and models:

  • OWASP Application Security Verification Standard (ASVS)

  • NIST Cybersecurity Framework

  • STRIDE model (Spoofing, Tampering, Repudiation, Information Disclosure, Denial of Service, Elevation of Privilege)

  • CIA triad (Confidentiality, Integrity, Availability)


Security Domains Covered

  • Cross-organization policies, procedures, and governance

  • Security operations, monitoring, and incident response

  • Network level security

  • Servers, network equipment, and endpoint security

  • Application-level security

  • Sensitive data and information management

  • Identity management and remote access

Did this answer your question?