Lines Matching full:these

24 in detail. As depicted in Figure 1, these main steps are:
40 how these assets are protected. Certification claims shall be
62 These words are used to define absolute requirements (or prohibitions),
64 noted in RFC-2119, "These terms are frequently used to specify behavior
83 2. The Zephyr Security Subcommittee will review these changes and provide feedback
86 3. Once accepted, these changes will become part of the document.
117 These topics are discussed in more detail in the following subsections.
220 examples of these would be:
235 Some of these categories are interconnected and rely on multiple pieces
241 The development of secure code shall adhere to certain criteria. These
266 These documents shall serve as an entry point to new developers and as a
275 adhering to a defined set of design standards. These standards are
324 In addition to these general principles, the following points are
353 Based on these design principles and commonly accepted best practices, a
366 the code review. These coding conventions are enforced by
377 These reviews shall be performed by the subsystem maintainers and
443 These points shall be evaluated with respect to their impact on the
480 These criteria and tasks need to be integrated into the development
545 these assets are protected by the system and which threats against them
549 these vulnerabilities. Additionally, the impact on the asset, the module
555 In short, the threat modeling process can be separated into these steps
575 From these threat models and mitigation techniques tests shall be
576 derived that prove the effectiveness of the countermeasures. These tests
606 The findings of these analyses shall be considered in the security issue
610 If possible (as in case of fuzzing analyses), these tests shall be
653 These steps are partially covered in previous sections as well. In
654 contrast to these sections, the certification process only requires to
668 these assumptions are met by the hardware and the application, a
677 assumptions on the application. If these are met, the final
690 hardware and/or software are required for certifications. These can
706 These assumptions shall be part of the security claim and evaluation