Data Flow Diagram
Objective
Document how data moves between components.
Identified Data Flows
- Administrative authentication flows
- Log transmission flows
- Backup synchronization flows
- Public service interaction flows
Security Considerations
For each flow:
- Authentication mechanism
- Encryption status
- Exposure level
- Monitoring coverage
Risk Alignment
Sensitive flows are reviewed against:
- Unauthorized access scenarios
- Data leakage risks