This is free content: you can redistribute it and/or modify it under the terms of the Creative Commons Attribution-ShareAlike 4.0 International Public License.
The use of Cyberismo trademark is governed by the Cyberismo open source trademark policy. See separate file TRADEMARK.adoc.
This content is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.
See the Creative Commons Attribution-ShareAlike 4.0 International Public License in the separate LICENSE file for more details.
The Cyberismo dataflow module defines card types and link types for creating dataflow models with processes, external entities, data storages, trust boundaries and data flows.
You can use this module as an example of the visualisation capabilities. For threat modelling and architecture diagrams, we recommend using the Cyberismo secure development essentials module instead. See Threat modelling tutorial in Cyberismo documentation for more information.