Data flow diagrams
These diagrams can help you build a System Security Plan for an application, or assess the security and compliance of an application.
Examples for customer System Security Plans
You can use these realistic sample diagrams as inspiration for your own diagrams for your customer system.
- Example #1 PDF (SVG) - A frontend website application and a backend API application, connected to a database.
- Example #2 PDF (SVG) - An application connected to a database and a Redis queue, with authentication, and with a connection to an external email service (not provided by cloud.gov).
- Data flow from the public to a public application
- Continuous deployment
- Administrative access to customer systems
Platform architecture diagrams from the cloud.gov P-ATO documentation package: