Closed DoomDragoon closed 9 months ago
Iteration 2
Iteration 3
I think this is pretty good. You have a nice progression. I would be more specific with actors names, like nurse, or ransomware attacker etc. like our professor mention in our check in. Im sure he will be looking to take points off for being too generic. IN our lectures, it also noted that is shouldn't be too technical. I had to google what RBAC meant. I always take the 'Would a 5-year-old understand this' approach. Other than some labels, I think you may be done!
This works well. You progress through the steps showing how it is able to perform the needed steps to create more security for the product.
Final Itteration
Thank you guys, I was having a brain freeze on how to label the threat actors as well as the clients.
https://forum.itflow.org/d/345-allow-technicians-to-add-clients https://github.com/itflow-org/itflow/issues/530
This is where I got the idea for the IDOR vulnerability.
Would phishing campaigns, password spraying, or man-in-the-middle attacks be additional attack methods that made be used to exploit the Identity Management Platform?
Final with Revisions
https://github.com/itflow-org/itflow/issues/673
Reasoning for SQL injection in Use case
A Security Researcher discovered that the code is vulnerable with a SQL injection on the client page, this got fixed. There was also a IDOR vulnerability with the fact that people could visit vital site pages if they had a valid URL, This got put in the release milestone 1.0.
Iteration 1