
Secure Software Development Lifecycle
Outlines how to embed security into planning, design, implementation, and deployment. Covers threat modeling, risk assessment, and secure-by-design practices.
SSDLCSecure Design
Deep dives, investigations, and research notes from the JustAppSec team.
Content is AI-assisted and reviewed by our team, but issues may be missed and best practices evolve rapidly, send corrections to [email protected]. Always consult official documentation and validate key implementation decisions before making design or security choices.

Outlines how to embed security into planning, design, implementation, and deployment. Covers threat modeling, risk assessment, and secure-by-design practices.

Describes structured methods to identify threats early using models like STRIDE and attack trees. Covers risk rating and mitigation planning.