View: Architectural Concepts

Incomplete
Type: Graph
Objective

This view organizes weaknesses according to common architectural security tactics. It is intended to assist architects in identifying potential mistakes that can be made when designing software.

Audience

TypeDescription
Software DevelopersArchitects that are part of a software development team may find this view useful as the weaknesses are organized by known security tactics, aiding the arcitect in embedding security throughout the design process instead of discovering weaknesses after the software has been built.
EducatorsEducators may use this view as reference material when discussing security by design or architectural weaknesses, and the types of mistakes that can be made.

Relationships
Authorize Actors- (CWE-1011)
Encrypt Data- (CWE-1013)
Validate Inputs- (CWE-1019)
Mapping Notes
Usage: Prohibited
Reasons: View
Rationale:
This entry is a View. Views are not weaknesses and therefore inappropriate to describe the root causes of vulnerabilities.
Comment:
Use this View or other Views to search and navigate for the appropriate weakness.