xref: /aosp_15_r20/external/arm-trusted-firmware/docs/threat_model/index.rst (revision 54fd6939e177f8ff529b10183254802c76df6d08)
1*54fd6939SJiyong ParkThreat Model
2*54fd6939SJiyong Park============
3*54fd6939SJiyong Park
4*54fd6939SJiyong ParkThreat modeling is an important part of Secure Development Lifecycle (SDL)
5*54fd6939SJiyong Parkthat helps us identify potential threats and mitigations affecting a system.
6*54fd6939SJiyong Park
7*54fd6939SJiyong ParkIn the next sections, we first give a description of the target of evaluation
8*54fd6939SJiyong Parkusing a data flow diagram. Then we provide a list of threats we have identified
9*54fd6939SJiyong Parkbased on the data flow diagram and potential threat mitigations.
10*54fd6939SJiyong Park
11*54fd6939SJiyong Park.. toctree::
12*54fd6939SJiyong Park   :maxdepth: 1
13*54fd6939SJiyong Park   :caption: Contents
14*54fd6939SJiyong Park   :numbered:
15*54fd6939SJiyong Park
16*54fd6939SJiyong Park   threat_model
17*54fd6939SJiyong Park   threat_model_spm
18*54fd6939SJiyong Park
19*54fd6939SJiyong Park--------------
20*54fd6939SJiyong Park
21*54fd6939SJiyong Park*Copyright (c) 2021, Arm Limited and Contributors. All rights reserved.*
22