issues
search
DoctorEww
/
software-assurance
1
stars
3
forks
source link
issues
Newest
Newest
Most commented
Recently updated
Oldest
Least commented
Least recently updated
Manual CWE Review - Drew
#109
adamspanier
closed
2 years ago
0
Manual CWE Review - Jensen
#108
adamspanier
closed
2 years ago
2
Manual CWE Review - Chris
#107
adamspanier
closed
2 years ago
0
Manual CWE Review - Justin
#106
adamspanier
closed
2 years ago
0
Manual CWE Review - Adam
#105
adamspanier
closed
2 years ago
0
Autoscan - Drew
#104
adamspanier
closed
2 years ago
0
Autoscan - Jensen
#103
adamspanier
closed
2 years ago
0
Autoscan - Chris
#102
adamspanier
closed
2 years ago
7
Autoscan - Justin
#101
adamspanier
closed
2 years ago
0
Autoscan - Adam
#100
adamspanier
closed
2 years ago
0
Choose 10 CWE's
#99
adamspanier
closed
2 years ago
0
Delegate CWE's to Team Members
#98
adamspanier
closed
2 years ago
0
Second Planning Meeting
#97
adamspanier
closed
2 years ago
0
Setup Second Meeting
#96
adamspanier
closed
2 years ago
0
Schedule planning meeting
#95
adamspanier
closed
2 years ago
0
Develop Code Review Strategy
#94
adamspanier
closed
2 years ago
0
Design Observations Summary
#93
adamspanier
closed
2 years ago
0
Threat Analysis - ID: 22
#92
adamspanier
closed
2 years ago
0
Threat Analysis - ID: 23
#91
adamspanier
closed
2 years ago
0
Threat Analysis - ID: 25
#90
adamspanier
closed
2 years ago
0
Threat Analysis - ID: 30
#89
adamspanier
closed
2 years ago
0
Threat Analysis ID 6
#88
adamspanier
closed
2 years ago
0
Threat Analysis ID 8
#87
adamspanier
closed
2 years ago
0
Threat Analysis ID 7
#86
adamspanier
closed
2 years ago
0
Threat Analysis ID 5
#85
adamspanier
closed
2 years ago
0
Threat Analysis ID 3
#84
adamspanier
closed
2 years ago
0
Threat Analysis - ID: 29
#83
adamspanier
closed
2 years ago
0
Threat Analysis - ID: 28
#82
adamspanier
closed
2 years ago
0
Threat Analysis - ID: 26
#81
adamspanier
closed
2 years ago
0
Threat Analysis - ID: 20
#80
adamspanier
closed
2 years ago
0
Threat Analysis - ID: 11
#79
adamspanier
closed
2 years ago
0
Threat Analysis - ID: 14
#78
adamspanier
closed
2 years ago
0
Threat Analysis - ID: 21
#77
adamspanier
closed
2 years ago
0
Threat Analysis - ID: 2
#76
adamspanier
closed
2 years ago
0
Threat Analysis - ID: 9
#75
adamspanier
closed
2 years ago
0
Threat Analysis - ID: 10
#74
adamspanier
closed
2 years ago
0
Threat Analysis - ID: 18
#73
adamspanier
closed
2 years ago
0
Threat Analysis - ID: 19
#72
adamspanier
closed
2 years ago
0
Threat Analysis - ID: 34
#71
adamspanier
closed
2 years ago
0
Threat Analysis - ID: 40
#70
adamspanier
closed
2 years ago
0
Threat Analysis - ID: 41
#69
adamspanier
closed
2 years ago
0
Each Member: Choose at least three (3) High Risk Threats.
#68
adamspanier
closed
2 years ago
0
Meeting 3: Address automatically generated threats
#67
adamspanier
closed
2 years ago
0
Schedule Planning Meeting 3
#66
adamspanier
closed
2 years ago
0
Reflection
#65
adamspanier
closed
2 years ago
0
Meeting 2: Design L0, L1, (L2) DFD's, Mitigate Threats, Assign Code Review
#64
adamspanier
closed
2 years ago
0
Schedule Planning Meeting 2
#63
adamspanier
closed
2 years ago
0
Assign mitigated risks, asses codebase for gaps.
#62
adamspanier
closed
2 years ago
0
Address automatically generated threats per each trust boundary in the DFD
#61
adamspanier
closed
2 years ago
0
Develop Level 1 BitWarden Program Data Flow
#60
adamspanier
closed
2 years ago
0
Next