This lesson is for subscribers
You've completed the free preview. Subscribe to unlock every lesson in every course.
Techniques for documenting system components, data flows, and trust boundaries in architectural diagrams for threat analysis.
You've completed the free preview. Subscribe to unlock every lesson in every course.