Skip to content

Commit 66748b5

Browse files
committed
update
1 parent ac0b112 commit 66748b5

File tree

2 files changed

+28
-1
lines changed

2 files changed

+28
-1
lines changed

security/fundamentals.md

Lines changed: 21 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,9 +1,29 @@
11
# Python Security Fundamentals
22

3-
This chapter provides a comprehensive exploration of the security mechanics inherent in Python development. We begin by deconstructing the Python Execution Model, establishing how the underlying runtime influences the safety of your code. Building on this technical foundation, we define a formal Python Threat Model to identify trust boundaries and protect vital assets.
3+
This chapter provides a comprehensive exploration of the security mechanics inherent in Python development.
4+
5+
To perform threat modelling for the use of Python software or when creating Python programs, insight into the Python architecture is required.
6+
7+
The core components when using a Python program are:
8+
9+
- **Execution environment**: This is the target environment where Python programs are executed.
10+
11+
- **Python interpreter software**: This is the software needed to execute Python software.
12+
13+
- **Dependencies**: The dependencies needed within the execution environment vary depending on the type of Python software.
14+
15+
The core components for when creating or running a Python program are:
16+
17+
- **Execution environment**: This is the target environment where Python programs are executed.
18+
19+
- **Python interpreter software**: This is the software needed to execute Python software.
20+
21+
- **Development tools**: This refers to all the software used to create Python software. Every organisation or developer may use different development tools. From a threat-modelling perspective—especially from a supply chain viewpoint—the development software and the processes used matter. Some tools include editors, notebooks, test software, test data, version control, issue management systems, and release tools.
422

523
The focus then shifts outward to the Python Attack Landscape, examining the external risks posed by the modern software supply chain and third-party dependencies. By understanding this environment, we categorise specific Python Security Threats.
624

725

26+
The following section provides key insights regarding the Python execution model. The Python execution model is relevant for when **creating Python** software or when only **using** Python software. The section outlines how the underlying runtime influences the safety of your code. Building on this technical foundation, we define a formal Python Threat Model to identify trust boundaries and protect vital assets. This section ends with the [Python Attack landscape](security/attacklandscape), a deep dive on all common security threats that are relevant for Python software.
27+
828

929
```{tableofcontents}

security/threatmodel.md

Lines changed: 7 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,12 @@
11
# Python Threat Model
22

3+
Threat modelling is the process of identifying and analysing potential security threats and vulnerabilities in a system, application, or network.
4+
5+
To mitigate potential security risks with a balanced budget, security threat modelling is critical.
6+
7+
Python is an interpreted general-purpose computer language. Using Python programs or creating Python software in a secure way requires insight into all potential security threats.
8+
9+
310
## Scope
411

512
Every high-quality threat model starts with a clearly defined scope.

0 commit comments

Comments
 (0)