It is clear with evidences that for last one decade security experts only giving importance to the traditionally available information security practices, such as secure protocols (SSL/TSL) and Intrusion Detection Systems like Honey Pot. These can only secure network level problems in the security issues, but all these are security functional requirement based techniques, not security assurance requirements. It is also observed that current vulnerability analysis techniques are focused on traditional old methods, those were in practice for last one decade for traditional software engineering, such as penetration of white Box and Black Box. These practices can only tailor threats based on a check list of security policies to analyze vulnerability by auditors that can short fall identifying design flaws through traditionally available intrusion detection tools or vulnerability analyzing tools. This research paper focuses on representing "A Process of Security Assurance Properties Unification" for Component-ware Risks related to application logic to deal logical vulnerability in system.