Lines Matching full:architecture

26 1. **Secure Development:** Defines the system architecture and
31 to enforce them. A security architecture of the system and
100 scoped for future releases. The Zephyr runtime architecture is a
139 The security architecture is based on a monolithic design where the
246 software security. Furthermore, a system architecture document shall be
249 System Architecture
252 .. figure:: media/security-zephyr-system-architecture.png
254 Figure 2: Zephyr System Architecture
256 A high-level schematic of the Zephyr system architecture is given in
257 Figure 2. It separates the architecture into an OS part (*kernel + OS
263 A document describing the system architecture and design choices shall
265 shall include the base architecture of the Zephyr OS and an overview of
266 important submodules. For each of the modules, a dedicated architecture
269 basis for the security architecture. Please refer to the
475 security strategy and architecture, and the preparation of audits
488 Security Architecture
512 The security architecture development is based on assets derived from
513 the structural overview of the overall system architecture. Based on
526 The security architecture shall be harmonized with the existing system
527 architecture and implementation to determine potential deviations and
530 individual documents describing their security architecture.
544 the development of an accurate security architecture and for most
553 model is then considered in the module and system security architecture
571 and before major changes of the module or system architecture.
638 2. Developing a **threat model** and **security architecture** to
658 The security architecture, for example, considers assets on system level