• Use scenarios
  • User types
  • External dependencies
  • Security Assumptions
  • Server
  • Client
  • Development
  • External Security Notes
  • Data Flow Diagrams
  • High Level Data Flow
  • Level-0 Data Flow
  • Level-1 Model Data Flow
  • Threat Assessment
  • Legend & Abbreviations
  • Key Risks & Mitigations