Prior to implementing a new application, its security must be thoroughly planned out. This process includes selecting the appropriate security technologies, standards, and suitable implementations. The specific decision must be carefully considered as this will affect the entire development process and lifecycle of the application.
A customized threat analysis will help you select the technologies and standards that are best suited to your application, which will eliminate time-consuming and costly adjustments in the future.
You want to ensure that the design of your planned application is secure?
Choosing the appropriate security technology is often not a trivial matter. Standards are continuously improved and technologies are constantly expanded, making it difficult for you to keep track of all available options.
This can be seen in the example of Single Sign-On procedures: The standards SAML, OAuth, and OpenID Connect are all widespread and used in many applications. Each of the standards offers different protocol flows and numerous extensions for special use cases. Therefore, after the decision for one of the standards has been made, additional questions may arise:
- Which protocol flows can I use in my scenario?
- How can I ensure that the technology is used in a secure way for my specific use?
- Are advanced security mechanisms such as PKCE or proof-of-possession tokens relevant to me?
Hackmanit employees have state-of-the-art knowledge due to their research background, offering you the opportunity to commission threat analysis on numerous IT security topics. We would be pleased to advise you on the design and implementation of various web services solutions (SOAP and REST), Single Sign-On procedures (SAML, OAuth and OpenID Connect), Information Rights Management (Microsoft RMS, Azure Rights Management and Oracle IRM), cryptographic procedures (selection of appropriate cipher suites and extensions for TLS), or web applications.
The following documents provide an example of our public threat analysis and expertise.
Public Threat Analysis and Expertise (2)
The following expertises were published in collaboration with Rhode and Schwarz Cybersecurity and the Federal Office for Information Security (BSI):
Are you unsure whether a threat analysis is the right procedure for you? We would be pleased to discuss individual options for evaluating the security of your planned application in a non-binding meeting.