Skip to content

Commit b539653

Browse files
authored
add content for LINDDUN GO
2 parents 652c4f9 + dd04a91 commit b539653

File tree

23 files changed

+220
-41
lines changed

23 files changed

+220
-41
lines changed

.github/workflows/release.yaml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -20,7 +20,7 @@ jobs:
2020
run: |
2121
cd draft
2222
pwd
23-
find . -name "*.md" ! -name "info.md" ! -name "01-front.md" -exec cp '{}' '../release/{}' \;
23+
find . -name "*.md" ! -name "info.md" -exec cp '{}' '../release/{}' \;
2424
2525
- name: Fix up markdown
2626
run: |
@@ -83,7 +83,7 @@ jobs:
8383
- name: Create pull request
8484
uses: peter-evans/[email protected]
8585
with:
86-
title: "Release for version $GITHUB_REF_NAME"
86+
title: "Release for version ${{ GITHUB_REF_NAME }}"
8787
body: |
8888
**Summary** :
8989
Pull request automatically generated for the latest release version

.wordlist.txt

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -469,4 +469,8 @@ testssl
469469
DrHEADer
470470
csp
471471
DocX
472-
MOBI
472+
MOBI
473+
linddun
474+
LINNDUN
475+
DPO
476+
CISO

_data/draft.yaml

Lines changed: 5 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -61,10 +61,13 @@ docs:
6161
- title: '4.1.3 Threat Dragon'
6262
url: design/threat_modeling/threat_dragon
6363

64-
- title: '4.1.4 Threat Modeling and Cornucopia'
64+
- title: '4.1.4 Cornucopia'
6565
url: design/threat_modeling/cornucopia
6666

67-
- title: '4.1.5 Threat Modeling toolkit'
67+
- title: '4.1.5 LINDDUN GO'
68+
url: design/threat_modeling/linddun-go
69+
70+
- title: '4.1.6 Threat Modeling toolkit'
6871
url: design/threat_modeling/toolkit
6972

7073
- title: '4.2 Web application checklist'

_data/release.yaml

Lines changed: 5 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -61,10 +61,13 @@ docs:
6161
- title: '4.1.3 Threat Dragon'
6262
url: design/threat_modeling/threat_dragon
6363

64-
- title: '4.1.4 Threat Modeling and Cornucopia'
64+
- title: '4.1.4 Cornucopia'
6565
url: design/threat_modeling/cornucopia
6666

67-
- title: '4.1.5 Threat Modeling toolkit'
67+
- title: '4.1.5 LINDDUN GO'
68+
url: design/threat_modeling/linddun-go
69+
70+
- title: '4.1.6 Threat Modeling toolkit'
6871
url: design/threat_modeling/toolkit
6972

7073
- title: '4.2 Web application checklist'

draft/02-toc.md

Lines changed: 3 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -37,8 +37,9 @@ permalink:
3737
4.1.1 [Threat modeling in practice](#threat-modeling-in-practice)
3838
4.1.2 [Pythonic Threat Modeling](#pythonic-threat-modeling)
3939
4.1.3 [Threat Dragon](#threat-dragon)
40-
4.1.4 [Threat Modeling and Cornucopia](#cornucopia)
41-
4.1.5 [Threat Modeling toolkit](#threat-modeling-toolkit)
40+
4.1.4 [Cornucopia](#cornucopia)
41+
4.1.5 [LINDDUN GO](#linddun-go)
42+
4.1.6 [Threat Modeling toolkit](#threat-modeling-toolkit)
4243
4.2 [Web application checklist](#web-application-checklist)
4344
4.2.1 [Checklist: Define Security Requirements](#checklist-define-security-requirements)
4445
4.2.2 [Checklist: Leverage Security Frameworks and Libraries](#checklist-leverage-security-frameworks-and-libraries)

draft/06-design/00-toc.md

Lines changed: 3 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -50,8 +50,9 @@ Sections:
5050
4.1.1 [Threat modeling in practice](#threat-modeling-in-practice)
5151
4.1.2 [Pythonic Threat Modeling](#pythonic-threat-modeling)
5252
4.1.3 [Threat Dragon](#threat-dragon)
53-
4.1.4 [Threat Modeling and Cornucopia](#cornucopia)
54-
4.1.5 [Threat Modeling toolkit](#threat-modeling-toolkit)
53+
4.1.4 [Cornucopia](#cornucopia)
54+
4.1.5 [LINDDUN GO](#linddun-go)
55+
4.1.6 [Threat Modeling toolkit](#threat-modeling-toolkit)
5556
4.2 [Web application checklist](#web-application-checklist)
5657
4.2.1 [Checklist: Define Security Requirements](#checklist-define-security-requirements)
5758
4.2.2 [Checklist: Leverage Security Frameworks and Libraries](#checklist-leverage-security-frameworks-and-libraries)

draft/06-design/01-threat-modeling/00-toc.md

Lines changed: 3 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -31,8 +31,9 @@ Sections:
3131
4.1.1 [Threat modeling in practice](#threat-modeling-in-practice)
3232
4.1.2 [Pythonic Threat Modeling](#pythonic-threat-modeling)
3333
4.1.3 [Threat Dragon](#threat-dragon)
34-
4.1.4 [Threat Modeling and Cornucopia](#cornucopia)
35-
4.1.5 [Threat Modeling toolkit](#threat-modeling-toolkit)
34+
4.1.4 [Cornucopia](#cornucopia)
35+
4.1.5 [LINDDUN GO](#linddun-go)
36+
4.1.6 [Threat Modeling toolkit](#threat-modeling-toolkit)
3637

3738
----
3839

draft/06-design/01-threat-modeling/04-cornucopia.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -12,7 +12,7 @@ permalink: /draft/design/threat_modeling/cornucopia/
1212

1313
{% include breadcrumb.html %}
1414

15-
### 4.1.4 Threat Modeling and Cornucopia
15+
### 4.1.4 Cornucopia
1616

1717
OWASP Cornucopia is a card game used to help derive application security requirements
1818
during the software development life cycle.
Lines changed: 82 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,82 @@
1+
---
2+
3+
title: Threat Modeling and LINDDUN GO
4+
layout: col-document
5+
tags: OWASP Developer Guide
6+
contributors: Jon Gadsden
7+
document: OWASP Developer Guide
8+
order: 615
9+
permalink: /draft/design/threat_modeling/linddun-go/
10+
11+
---
12+
13+
{% include breadcrumb.html %}
14+
15+
### 4.1.5 LINDDUN GO
16+
17+
LINNDUN GO is a card game used to help derive privacy requirements during the software development life cycle.
18+
The LINNDUN GO card set can be [downloaded][linddun-go-cards] as a PDF and then printed out.
19+
20+
#### What is LINDDUN GO?
21+
22+
[LINDDUN GO][linddun-go] helps identify potential privacy threats based on the key LINDDUN threats to privacy:
23+
24+
* Linking
25+
* Identifying
26+
* Non-repudiation
27+
* Detecting
28+
* Data Disclosure
29+
* Unawareness
30+
* Non-compliance
31+
32+
LINNDUN GO is similar to OWASP [Cornucopia][cornucopia] in that it takes the form of a set of cards that
33+
can be used to gamify the process of identifying application privacy / security requirements.
34+
The deck of 33 cards are arranged in suits that match each category of threats to privacy,
35+
and there is a [set of rules][linddun-go-rules] to structure the game sessions.
36+
Each LINDDUN GO card illustrates a single common privacy threat and suggested remediations.
37+
38+
#### Why use it?
39+
40+
[LINDDUN][linddun] is an approach to threat modeling from a privacy perspective.
41+
It is a methodology that is useful to structure and guide the identification of threats to privacy,
42+
and also helps with suggestions for the mitigation of any threats.
43+
44+
[LINDDUN GO][linddun-go] gamifies this approach to privacy with a set of cards and rules
45+
to guide the identification process for threats to the privacy provided by the application.
46+
This is a change to other established processes and provides a different and useful perspective to the system.
47+
48+
#### How to use LINDDUN GO
49+
50+
The idea for a LINDDUN GO is that it is played in person by a diverse team with as varied a set of viewpoints as possible.
51+
The advice from the LINDDUN GO 'getting started' instructions is that this team contains some or all of:
52+
53+
* domain experts
54+
* system architects
55+
* developers
56+
* the Data Protection Officer (DPO)
57+
* legal experts
58+
* the Chief Information Security Officer (CISO)
59+
* privacy champions
60+
61+
The application should have already been described by an architecture diagram or data flow diagram
62+
so that the players have something to refer to during the game.
63+
[Download][linddun-go-cards] and printout the deck of cards.
64+
65+
Follow the [set of rules][linddun-go-rules] to structure the game session, record the outcome and act on it.
66+
The outcome of the game is to identify possible privacy threats and propose remediations;
67+
as well as having a good time of course.
68+
69+
----
70+
71+
The OWASP Developer Guide is a community effort; if there is something that needs changing
72+
then [submit an issue][issue060105] or [edit on GitHub][edit060105].
73+
74+
[cornucopia]: https://owasp.org/www-project-cornucopia/
75+
[edit060105]: https://github.com/OWASP/www-project-developer-guide/blob/main/draft/06-design/01-threat-modeling/05-linddun-go.md
76+
[issue060105]: https://github.com/OWASP/www-project-developer-guide/issues/new?labels=content&template=request.md&title=Update:%2006-design/01-threat-modeling/05-linddun-go
77+
[linddun]: https://linddun.org/
78+
[linddun-go]: https://linddun.org/go/
79+
[linddun-go-cards]: https://downloads.linddun.org/linddun-go/default/latest/go.pdf
80+
[linddun-go-rules]: https://linddun.org/go-getting-started/
81+
82+
\newpage

draft/06-design/01-threat-modeling/05-toolkit.md renamed to draft/06-design/01-threat-modeling/06-toolkit.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -5,14 +5,14 @@ layout: col-document
55
tags: OWASP Developer Guide
66
contributors: Jon Gadsden
77
document: OWASP Developer Guide
8-
order: 615
8+
order: 616
99
permalink: /draft/design/threat_modeling/toolkit/
1010

1111
---
1212

1313
{% include breadcrumb.html %}
1414

15-
### 4.1.5 Threat Modeling toolkit
15+
### 4.1.6 Threat Modeling toolkit
1616

1717
There is no one technique or tool that fits every threat modeling process.
1818
The process can be tactical or architectural, subjective or automated, attack tree or data flow diagram,
@@ -59,12 +59,12 @@ providing practical suggestions along with explanations of both the terminology
5959
----
6060

6161
The OWASP Developer Guide is a community effort; if there is something that needs changing
62-
then [submit an issue][issue060105] or [edit on GitHub][edit060105].
62+
then [submit an issue][issue060106] or [edit on GitHub][edit060106].
6363

6464
[4QFW]: https://github.com/adamshostack/4QuestionFrame
6565
[asacs]: https://cheatsheetseries.owasp.org/cheatsheets/Attack_Surface_Analysis_Cheat_Sheet.html
66-
[issue060105]: https://github.com/OWASP/www-project-developer-guide/issues/new?labels=content&template=request.md&title=Update:%2006-design/01-threat-modeling/05-toolkit
67-
[edit060105]: https://github.com/OWASP/www-project-developer-guide/blob/main/draft/06-design/01-threat-modeling/05-toolkit.md
66+
[issue060106]: https://github.com/OWASP/www-project-developer-guide/issues/new?labels=content&template=request.md&title=Update:%2006-design/01-threat-modeling/06-toolkit
67+
[edit060106]: https://github.com/OWASP/www-project-developer-guide/blob/main/draft/06-design/01-threat-modeling/06-toolkit.md
6868
[toolkit]: https://www.youtube.com/watch?v=KGy_KCRUGd4
6969
[tmcs]: https://cheatsheetseries.owasp.org/cheatsheets/Threat_Modeling_Cheat_Sheet.html
7070
[tmpb]: https://owasp.org/www-project-threat-modeling-playbook/

0 commit comments

Comments
 (0)