Provide context with the right depth layer

Beginner
Administrator
Developer
DevOps Engineer
Security Engineer
Solution Architect
Security Center for IoT
Azure Security Center
Microsoft 365 Security Center
Cloud App Security

Threat models can get complex if all parties involved cannot agree on a data-flow diagram depth layer that provides enough context to satisfy requirements

Learning objectives

In this module, you will be able to:

  • Learn the differences between each data-flow diagram depth layer
  • Know when to use them

Prerequisites

None