Our Approch

1

Identify critical assets

2

Describe Architecture

3

Document the data flows and decompose the application

4

Identify and document the threats

5

Categorize the threats

6

Discuss the findings with customer

7

Prepare final report