|
|
The following context diagrams were extracted from a few of the data ecosystem threat models. The threat models with associated risks and mitigations remain confidential; however, the diagrams provide a useful interaction view of the system.
|
|
|
|
|
|
## Data Ecosystem context diagram
|
|
|
![Data Ecosystem Context.png](uploads/Data%20Ecosystem%20Context-5b1667a3-bbad-449c-8269-1f274764ae7c.png)
|
|
|
|
|
|
## Search context diagram
|
|
|
![Search Context.png](uploads/Search%20Context-6d6adca6-5653-4696-b737-79a3b0b40f55.png)
|
|
|
|
|
|
## Storage context diagram
|
|
|
![Storage Context.png](uploads/Storage%20Context-ec2ba08c-ad58-46d8-9013-21c17da677ee.png)
|
|
|
|
|
|
## File context diagram
|
|
|
![File Context.png](uploads/File%20Context-6c8bd139-5c6a-4774-a401-681483beb14d.png)
|
|
|
|
|
|
## Messaging context diagram
|
|
|
![Messaging Context Diagram.png](uploads/Messaging%20Context%20Diagram-de8584c1-96ae-44c4-bd62-e5ab0f25c651.png)
|
|
|
|
|
|
## Plugin manager diagram
|
|
|
![Plugin Manager Context.png](uploads/Plugin%20Manager%20Context-3e89c1a9-6855-44a2-bcae-1d4288c284dc.png) |
|
|
\ No newline at end of file |