blob: b5ede69003aa1f4e6257f91a97bf1f590b7ce5b0 [file] [log] [blame]
Zelalem05fed522021-02-24 19:20:09 -06001Threat Model
Olivier Deprez86d1ffd2021-06-01 15:37:16 +02002============
3
4Threat modeling is an important part of Secure Development Lifecycle (SDL)
5that helps us identify potential threats and mitigations affecting a system.
6
7In the next sections, we first give a description of the target of evaluation
8using a data flow diagram. Then we provide a list of threats we have identified
9based on the data flow diagram and potential threat mitigations.
Zelalem05fed522021-02-24 19:20:09 -060010
11.. toctree::
12 :maxdepth: 1
13 :caption: Contents
14 :numbered:
15
16 threat_model
Olivier Deprez86d1ffd2021-06-01 15:37:16 +020017 threat_model_spm
Zelalem05fed522021-02-24 19:20:09 -060018
19--------------
20
21*Copyright (c) 2021, Arm Limited and Contributors. All rights reserved.*