To create a Security Constraints Definition diagram
In the Containment Tree, select the Security Constraints package and do one of the following:
From the selected package's shortcut menu, select Create Diagram > Security Constraints Definition.
In the modeling tool's main menu, click Create Diagram, search for Security Constraints Definition and select it.
Name a diagram or leave it with the default name.
Creating an element
When the diagram is created, you can start creating the appropriate elements (assets). An example is described using the Security Enclave element, but the same is valid for other assets.
To create an element in a diagram
In the diagram palette, click the Security Enclave (or another appropriate element) and then click the appropriate place on the diagram pane.
Name the element.
To create an element in the Containment tree
Right-click the Security Taxonomy package and from the shortcut menu, select Create Element. Search for the Security Enclave (or another appropriate element) and select it.
Name the element.
Drag the created element from the Containment tree to the diagram pane.
To create the elements from other resources (e.g. Word, Excel, HTML)
Copy a list in your resource.
In a diagram, press Ctrl+V and from the Paste Special dialog, choose Element.
From the Select Type dialog, choose Security Enclave (or another appropriate element).
On the diagram pane, select the asset (e.g. Security Enclave) and from its smart manipulator toolbar, select and then click another asset to connect them.
Click and on the diagram palette, and connect the assets.
Specify the Exchange Name, Resource Exchange Type.
Select the Exchange Kind from one of the following:
Geo Political Extent Exchange
Resource Communication
Resource Energy Flow
Resource Movement
Click Next to specify Producing and Consuming Functions.
To create a Security Constraint in the Specification window
Select a needed asset and open its Specification window.
In the Constraints property group, click Create > Security > Security Constraint.
Specify the name.
In the Specification cell, define the rule.
Note
The specification (rule) can be defined in English as well as using expressions or formulas (OCL).
There are the following constrained elements that can be a subject of the Security Constraint:
Asset
Asset Role
Exchange
Security Process
To apply Security Constraints, do one of the following
In the Containment tree, select a Security Constraint and drag it on the element.
In the needed element's Specification window, go to Constraints property group. Click the Apply button and from the Select Element window, choose a constraint.