On this page

Creating a diagram


To create a Security Constraints Definition diagram


  1. In the Containment Tree, select the Security Constraints package and do one of the following:
    • From the selected package's shortcut menu, select Create Diagram > Security Constraints Definition.
    • In the modeling tool's main menu, click Create Diagram, search for Security Constraints Definition and select it.
  2. Name a diagram or leave it with the default name.

Creating an element

When the diagram is created, you can start creating the appropriate elements (assets). An example is described using the Security Enclave element, but the same is valid for other assets.


To create an element in a diagram


  1. In the diagram palette, click the Security Enclave (or another appropriate element) and then click the appropriate place on the diagram pane.
  2. Name the element.


To create an element in the Containment tree


  1. Right-click the Security Taxonomy package and from the shortcut menu, select Create Element. Search for the Security Enclave (or another appropriate element) and select it.

  2. Name the element.
  3. Drag the created element from the Containment tree to the diagram pane.


To create the elements from other resources (e.g. Word, Excel, HTML)


  1. Copy a list in your resource.
  2. In a diagram, press Ctrl+V and from the Paste Special dialog, choose Element
  3. From the Select Type dialog, choose Security Enclave (or another appropriate element).
For more information about creating the elements from other resources, see Creating elements from other resources.

Creating Resource Exchanges in Security Constraints Definition diagram

To create a Resource Exchange


  1. Open the Realized Resource Exchange wizard by doing one of the following:
    • On the diagram pane, select the asset (e.g. Security Enclave) and from its smart manipulator toolbar, select and then click another asset to connect them.
    • Click and on the diagram palette, and connect the assets.
  2. Specify the Exchange Name, Resource Exchange Type.

  3. Select the Exchange Kind from one of the following:
    • Geo Political Extent Exchange

    • Resource Communication
    • Resource Energy Flow
    • Resource Movement
  4. Click Next to specify Producing and Consuming Functions.
  5. Click Finish when you are done.

Creating and applying Security Constraints

You can create the Security Constraints in the same way as other elements - from the diagram palette or in the Containment tree. See Creating an element. Also, you can create constraints in the selected asset's Specification window.


To create a Security Constraint in the Specification window


  1. Select a needed asset and open its Specification window.
  2. In the Constraints property group, click Create > Security > Security Constraint.
  3. Specify the name.
  4. In the Specification cell, define the rule. 

    The specification (rule) can be defined in English as well as using expressions or formulas (OCL).

There are the following constrained elements that can be a subject of the Security Constraint:

  1. Asset
  2. Asset Role
  3. Exchange
  4. Security Process


To apply Security Constraints, do one of the following


  • In the Containment tree, select a Security Constraint and drag it on the element.
  • In the needed element's Specification window, go to Constraints property group. Click the Apply button and from the Select Element window, choose a constraint.