Lines Matching full:architecture

26 1. **Secure Development:** Defines the system architecture and
31 to enforce them. A security architecture of the system and
100 scoped for future releases. The Zephyr runtime architecture is a
137 The security architecture is based on a monolithic design where the
244 software security. Furthermore, a system architecture document shall be
247 System Architecture
250 .. figure:: media/security-zephyr-system-architecture.png
252 Figure 2: Zephyr System Architecture
254 A high-level schematic of the Zephyr system architecture is given in
255 Figure 2. It separates the architecture into an OS part (*kernel + OS
261 A document describing the system architecture and design choices shall
263 shall include the base architecture of the Zephyr OS and an overview of
264 important submodules. For each of the modules, a dedicated architecture
267 basis for the security architecture. Please refer to the
473 security strategy and architecture, and the preparation of audits
486 Security Architecture
510 The security architecture development is based on assets derived from
511 the structural overview of the overall system architecture. Based on
524 The security architecture shall be harmonized with the existing system
525 architecture and implementation to determine potential deviations and
528 individual documents describing their security architecture.
542 the development of an accurate security architecture and for most
551 model is then considered in the module and system security architecture
569 and before major changes of the module or system architecture.
636 2. Developing a **threat model** and **security architecture** to
656 The security architecture, for example, considers assets on system level