blob: e113c3c9f7c7e564124afb2320c2d8a4435cc49d [file] [log] [blame]
Javier Almansa Sobrino5bf96ce2023-04-06 16:53:02 +01001.. SPDX-License-Identifier: BSD-3-Clause
2.. SPDX-FileCopyrightText: Copyright TF-RMM Contributors.
3
4Introduction
5============
6
7Threat modeling is an important part of Secure Development Lifecycle (SDL)
8that helps us identify potential threats and mitigations affecting a system.
9
10In the next sections, we present the Threat Model for RMM, giving first a
11description of the target of evaluation using a data flow diagram.
12Then we provide a list of threats that we have identified based on the
13data flow diagram and potential threat mitigations.
14