blob: 9fd55a92c14b231c5eb00b1a9720d656d529d205 [file] [log] [blame]
Zelalem7006f202021-02-24 19:20:09 -06001Threat Model
Olivier Deprez3af9b3f2021-06-01 15:37:16 +02002============
3
4Threat modeling is an important part of Secure Development Lifecycle (SDL)
5that helps us identify potential threats and mitigations affecting a system.
6
7In the next sections, we first give a description of the target of evaluation
8using a data flow diagram. Then we provide a list of threats we have identified
9based on the data flow diagram and potential threat mitigations.
Zelalem7006f202021-02-24 19:20:09 -060010
11.. toctree::
12 :maxdepth: 1
13 :caption: Contents
Zelalem7006f202021-02-24 19:20:09 -060014
15 threat_model
Olivier Deprez3af9b3f2021-06-01 15:37:16 +020016 threat_model_spm
Shruti Gupta20155112022-09-27 14:21:13 +010017 threat_model_el3_spm
Gary Morrisondc669222021-11-10 14:40:15 -060018 threat_model_fvp_r
Tamas Banc201d6e2022-11-30 17:09:43 +010019 threat_model_rss_interface
Zelalem7006f202021-02-24 19:20:09 -060020
21--------------
22
Tamas Banc201d6e2022-11-30 17:09:43 +010023*Copyright (c) 2021-2022, Arm Limited and Contributors. All rights reserved.*