The document describes threat modeling for a web application with user authentication. It identifies threats to the web UI and web application components, including spoofing, tampering, and information disclosure. It then provides example attacks for different authentication methods and recommends countermeasures and which standards/requirements they meet. Finally, it includes example tests for validating the countermeasures using behavior-driven development (BDD) style.
Related topics: