-
Book Overview & Buying
-
Table Of Contents
-
Feedback & Rating

Threat Modeling Gameplay with EoP
By :

An attacker can modify your build system and produce signed builds of your software:
Threat |
|
|
Your credentials have been stolen and an attacker uses them to log in to the continuous integration/continuous delivery (CI/CD) platform. They modify the workflow so that it includes malware in the build artifact (JAR/executable/install files). |
CAPEC |
CAPEC-678: System Build Data Maliciously Altered CAPEC-445: Malicious Logic Insertion into Product Software via Configuration Management Manipulation CAPEC-670: Software Development Tools Maliciously Altered CAPEC-446: Malicious Logic Insertion into Product via Inclusion of Third-Party Component CAPEC-511: Infiltration of Software Development Environment CAPEC-538: Open-Source Library Manipulation CAPEC-186: Malicious... |
Change the font size
Change margin width
Change background colour