Gyorgy Szing | 0bbd4ed | 2025-02-21 01:01:59 +0100 | [diff] [blame] | 1 | Security |
| 2 | ======== |
Julian Hall | e76ade8 | 2020-11-25 03:07:21 +0100 | [diff] [blame] | 3 | |
| 4 | .. toctree:: |
| 5 | :maxdepth: 1 |
| 6 | :caption: Contents: |
| 7 | |
Gyorgy Szing | 0bbd4ed | 2025-02-21 01:01:59 +0100 | [diff] [blame] | 8 | security-model |
| 9 | threat-models/generic-threat-model |
Julian Hall | e76ade8 | 2020-11-25 03:07:21 +0100 | [diff] [blame] | 10 | |
Gyorgy Szing | 0bbd4ed | 2025-02-21 01:01:59 +0100 | [diff] [blame] | 11 | The security model outlines the foundational security principles of the project. Refer to this section for an overview |
| 12 | of key concepts and the high-level security architecture. |
| 13 | |
| 14 | Threat models support the understanding of security requirements, potential threats, and vulnerabilities. They also aid |
| 15 | in evaluating the security posture of a Trusted Service. Consult these sections for detailed, service-specific security |
| 16 | information. |
Julian Hall | e76ade8 | 2020-11-25 03:07:21 +0100 | [diff] [blame] | 17 | |
| 18 | -------------- |
| 19 | |
Gyorgy Szing | 0bbd4ed | 2025-02-21 01:01:59 +0100 | [diff] [blame] | 20 | *Copyright (c) 2025, Arm Limited and Contributors. All rights reserved.* |
Julian Hall | e76ade8 | 2020-11-25 03:07:21 +0100 | [diff] [blame] | 21 | |
| 22 | SPDX-License-Identifier: BSD-3-Clause |