Javier Almansa Sobrino | 5bf96ce | 2023-04-06 16:53:02 +0100 | [diff] [blame] | 1 | .. SPDX-License-Identifier: BSD-3-Clause |
| 2 | .. SPDX-FileCopyrightText: Copyright TF-RMM Contributors. |
| 3 | |
| 4 | Introduction |
| 5 | ============ |
| 6 | |
| 7 | Threat modeling is an important part of Secure Development Lifecycle (SDL) |
| 8 | that helps us identify potential threats and mitigations affecting a system. |
| 9 | |
| 10 | In the next sections, we present the Threat Model for RMM, giving first a |
| 11 | description of the target of evaluation using a data flow diagram. |
| 12 | Then we provide a list of threats that we have identified based on the |
| 13 | data flow diagram and potential threat mitigations. |
| 14 | |