docs(threat model): add Threat Model for RMM
Signed-off-by: Javier Almansa Sobrino <javier.almansasobrino@arm.com>
Change-Id: I64b16d55b109c915a7820277ec14dbf290b32647
diff --git a/docs/security/threat_model/introduction.rst b/docs/security/threat_model/introduction.rst
new file mode 100644
index 0000000..e113c3c
--- /dev/null
+++ b/docs/security/threat_model/introduction.rst
@@ -0,0 +1,14 @@
+.. SPDX-License-Identifier: BSD-3-Clause
+.. SPDX-FileCopyrightText: Copyright TF-RMM Contributors.
+
+Introduction
+============
+
+Threat modeling is an important part of Secure Development Lifecycle (SDL)
+that helps us identify potential threats and mitigations affecting a system.
+
+In the next sections, we present the Threat Model for RMM, giving first a
+description of the target of evaluation using a data flow diagram.
+Then we provide a list of threats that we have identified based on the
+data flow diagram and potential threat mitigations.
+