Verify Application Attributes

After describing the application, you can review and validate threat model inputs

After providing the initial inputs to the threat model, DevArmor distills specific information that is required to perform a threat model. In the "Decompose" tab, you can review this information, make any changes, and approve them.

Last updated

Was this helpful?