-
Hi,
Do you plan adding a threat modeling ([STRIDE](https://owasp.org/www-community/Threat_Modeling_Process#), PASTA, [cloud native](https://www.cncf.io/blog/2023/03/16/threat-modeling-to-cloud-native…
-
# Architecture
This document outlines the architecture of the AI Nutrition-Pro application, including system context, containers, and deployment views. The architecture is depicted using C4 diagram…
-
### Context
We want to identify asset threats with their corresponding data flow threats.
### What needs to get done
1. Organize team brainstorming session.
2. In the Target of Evaluation doc fil…
-
### Session description
When a standard is written, it's required to write Security and Privacy Considerations and, if the technology is particularly disruptive, to sample the human rights impact.
On…
-
### Context
We want to identify controls and then reference them in the threats in the doc.
### What needs to get done
1. Organize team brainstorming session.
2. In the Target of Evaluation doc f…
-
# Authors
- @arber-salihi
- @ollol88
- @yilmi
# Summary
This RFC proposes the creation of a threat model to identify and analyze potential security risks across the AI supply chain. The goal …
-
**Description**
Kubescape still reports some miss-configurations. It has to be checked, if the secure configuration of KIM can be improved. Especially the following settings have to be che…
-
### Context
After all team sessions we want to finalize the doc.
### What needs to get done
1. Finish all missing fields in the doc
2. Sync with security team about feedback
3. Open more tasks …
-
I encountered a challenge in creating high-quality design documents for my threat modeling research. About a year and a half ago, I created AI Nutrition-Pro architecture and have been using it since t…
-
### Context
We want to identify assets with their corresponding data-flows.
### What needs to get done
1. Organize team brainstorming session.
2. In the Target of Evaluation doc fill the lists of…