Closed DoomDragoon closed 9 months ago
One thing I would add is a large box showing this all takes place inside the system, and weather or not it might have to interact with various different ERP systems of clients. Otherwise this looks pretty damn good for a first draft
If possible, I would try to add some additional levels of exploitations that may be used to get past the controls referenced and any additional system controls that are available to address those vulnerabilities.
If possible, I would try to add some additional levels of exploitations that may be used to get past the controls referenced and any additional system controls that are available to address those vulnerabilities.
Thanks for the feedback, I added an additional level and protections to the diagram.
Reopened until reviewed