xref: /rk3399_ARM-atf/docs/threat_model/index.rst (revision 3af9b3f0f0afeab5ea5080e97ca1b985505ad1a5)
17006f208SZelalemThreat Model
2*3af9b3f0SOlivier Deprez============
3*3af9b3f0SOlivier Deprez
4*3af9b3f0SOlivier DeprezThreat modeling is an important part of Secure Development Lifecycle (SDL)
5*3af9b3f0SOlivier Deprezthat helps us identify potential threats and mitigations affecting a system.
6*3af9b3f0SOlivier Deprez
7*3af9b3f0SOlivier DeprezIn the next sections, we first give a description of the target of evaluation
8*3af9b3f0SOlivier Deprezusing a data flow diagram. Then we provide a list of threats we have identified
9*3af9b3f0SOlivier Deprezbased on the data flow diagram and potential threat mitigations.
107006f208SZelalem
117006f208SZelalem.. toctree::
127006f208SZelalem   :maxdepth: 1
137006f208SZelalem   :caption: Contents
147006f208SZelalem   :numbered:
157006f208SZelalem
167006f208SZelalem   threat_model
17*3af9b3f0SOlivier Deprez   threat_model_spm
187006f208SZelalem
197006f208SZelalem--------------
207006f208SZelalem
217006f208SZelalem*Copyright (c) 2021, Arm Limited and Contributors. All rights reserved.*
22