TrustOnCloud Documentation¶ This resource explains how we model threats, score risk, and define controls. You’ll find: Key terms in the Glossary System diagrams in Data Flow Diagrams Threat scoring using CVSS Risk mitigation in Controls Update priorities in OverWatch Service API operations in Actions