Data-Flow Diagrams Contains assets, stores, security controls and trust boundaries. Mitigations of attacks are in the attack tree. Supply Chain Transactions Cloud Backup