Zelalem | 05fed52 | 2021-02-24 19:20:09 -0600 | [diff] [blame] | 1 | Threat Model |
Olivier Deprez | 86d1ffd | 2021-06-01 15:37:16 +0200 | [diff] [blame] | 2 | ============ |
| 3 | |
| 4 | Threat modeling is an important part of Secure Development Lifecycle (SDL) |
| 5 | that helps us identify potential threats and mitigations affecting a system. |
| 6 | |
| 7 | In the next sections, we first give a description of the target of evaluation |
| 8 | using a data flow diagram. Then we provide a list of threats we have identified |
| 9 | based on the data flow diagram and potential threat mitigations. |
Zelalem | 05fed52 | 2021-02-24 19:20:09 -0600 | [diff] [blame] | 10 | |
| 11 | .. toctree:: |
| 12 | :maxdepth: 1 |
| 13 | :caption: Contents |
Zelalem | 05fed52 | 2021-02-24 19:20:09 -0600 | [diff] [blame] | 14 | |
| 15 | threat_model |
Olivier Deprez | 86d1ffd | 2021-06-01 15:37:16 +0200 | [diff] [blame] | 16 | threat_model_spm |
Shruti Gupta | 795af71 | 2022-09-27 14:21:13 +0100 | [diff] [blame] | 17 | threat_model_el3_spm |
Gary Morrison | d4d951a | 2021-11-10 14:40:15 -0600 | [diff] [blame] | 18 | threat_model_fvp_r |
Zelalem | 05fed52 | 2021-02-24 19:20:09 -0600 | [diff] [blame] | 19 | |
| 20 | -------------- |
| 21 | |
| 22 | *Copyright (c) 2021, Arm Limited and Contributors. All rights reserved.* |