News
For targeted threat modeling, it may be helpful to create additional data flow diagrams to support a specific use case. One example would be a diagram that looks at authentication separate and apart ...
This example ... output data sets are colored green, and all other nodes (representing the use of other parts of the SAS System) are colored cyan. Three ID variables are used to specify the text that ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results