Lines Matching full:architecture
26 1. **Secure Development:** Defines the system architecture and
31 to enforce them. A security architecture of the system and
100 scoped for future releases. The Zephyr runtime architecture is a
139 The security architecture is based on a monolithic design where the
248 software security. Furthermore, a system architecture document shall be
251 System Architecture
254 .. figure:: media/security-zephyr-system-architecture.png
256 Figure 2: Zephyr System Architecture
258 A high-level schematic of the Zephyr system architecture is given in
259 Figure 2. It separates the architecture into an OS part (*kernel + OS
265 A document describing the system architecture and design choices shall
267 shall include the base architecture of the Zephyr OS and an overview of
268 important submodules. For each of the modules, a dedicated architecture
271 basis for the security architecture. Please refer to the
477 security strategy and architecture, and the preparation of audits
490 Security Architecture
514 The security architecture development is based on assets derived from
515 the structural overview of the overall system architecture. Based on
528 The security architecture shall be harmonized with the existing system
529 architecture and implementation to determine potential deviations and
532 individual documents describing their security architecture.
546 the development of an accurate security architecture and for most
555 model is then considered in the module and system security architecture
573 and before major changes of the module or system architecture.
640 2. Developing a **threat model** and **security architecture** to
660 The security architecture, for example, considers assets on system level