17006f208SZelalemThreat Model 2*3af9b3f0SOlivier Deprez============ 3*3af9b3f0SOlivier Deprez 4*3af9b3f0SOlivier DeprezThreat modeling is an important part of Secure Development Lifecycle (SDL) 5*3af9b3f0SOlivier Deprezthat helps us identify potential threats and mitigations affecting a system. 6*3af9b3f0SOlivier Deprez 7*3af9b3f0SOlivier DeprezIn the next sections, we first give a description of the target of evaluation 8*3af9b3f0SOlivier Deprezusing a data flow diagram. Then we provide a list of threats we have identified 9*3af9b3f0SOlivier Deprezbased on the data flow diagram and potential threat mitigations. 107006f208SZelalem 117006f208SZelalem.. toctree:: 127006f208SZelalem :maxdepth: 1 137006f208SZelalem :caption: Contents 147006f208SZelalem :numbered: 157006f208SZelalem 167006f208SZelalem threat_model 17*3af9b3f0SOlivier Deprez threat_model_spm 187006f208SZelalem 197006f208SZelalem-------------- 207006f208SZelalem 217006f208SZelalem*Copyright (c) 2021, Arm Limited and Contributors. All rights reserved.* 22