Diagram:
Legend: Any additional explanatory text needed to understand the pattern.
Description: Overview of the pattern. E.g. Secure desktop or laptop computers provided in a managed computing environment.
Strategic intent of pattern e.g. support de-perimeterisation.
Describe any additional architectural principles that may be reflected in the pattern.
Assumptions: Specific assumptions that have been made when writing the pattern that the target audience needs to appreciate.
Typical challenges: What can make the pattern hard to implement successfully, with possible mitigation strategies.
Indications: When should you apply this pattern. E.g. organisation with supported computing environment.
Contra-indications: When you should not use this pattern. E.g. Single user environment e.g. Home user.
Resistance against threats: List of the threats that the pattern can resist.
References: List of references e.g. URL's, publications that can give more information or have informed the approach.
Related patterns: Any other OSA patterns that are relevant
Classification: Module | Industry sector | Threat | Infrastructure area
Release: e.g. 08.02
Authors: Names
Reviewer(s): Names