Provide context with the right depth layer

Beginner
Administrator
Developer
DevOps Engineer
Security Engineer
Solutions Architect
Security Center for IoT
Security Center
Security Center
Cloud App Security

Threat models can get complex if all parties involved cannot agree on a data-flow diagram depth layer that provides enough context to satisfy requirements

In this module, you will be able to:

  • Learn the differences between each data-flow diagram depth layer
  • Know when to use them

Prerequisites

None