On this page
Creating a Security Internal Connectivity (Operational) diagram
The Resource Internal Connectivity (Operational) diagram requires that the Security Taxonomy diagram should be completed.
To create a Resource Internal Connectivity (Operational) diagram
- Create Operational Roles and Operational Ports.
- Associate Operational Roles using Operational Connectors.
- Create Operational Exchanges flowing via Operational Connectors.
Creating Operational Exchange in Security Internal Connectivity (Operational) diagram
To create an Operational Exchange in the Security Internal Connectivity (Operational) diagram
- Open the Realized Operational Exchange wizard by doing one of the following:
- On the diagram pane, select the Operational Connector, and in the smart manipulator toolbar, click.
- On the diagram palette, click and then click the Operational Connector.
- Select the Operational Exchange Kind from one of the following:
- Configuration
- Energy
- Geo Political Extent
- Information
- Materiel
- Organizational
Specify the Operational Exchange, Conveyed Item, and Direction.
- Click Next to specify Producing and Consuming Activities.
- Click Finish when you are done.
If you did not specify the Conveyed Item while creating the Operational Exchange, you can set it later, directly in the diagram picking the needed element from the diagram palette.
To specify the Conveyed Item directly on the diagram pane
- In the diagram palette, select the needed Conveyed Item.
- Drag the selected Conveyed Item on to the needed Operational Exchange on the diagram pane. The Realized Operational Exchange wizard opens.
- Follow the steps of the wizard.
- Click Finish when you are done.
You can use Operational Exchange Manager dialog to analyze and manage the Operational Exchange data.
UAF Behavior to structure synchronization. You can check the consistency of the Security Internal Connectivity diagram with Operational Activities, automatically detect inconsistencies, and handle each inconsistency individually using solver actions to ensure the coherence of the Security Internal Connectivity diagram.
Related pages