Roles
| A specialised type of router comprising part of a cellular network that provides a radio access network in a locality (a cell), and has its own connection to wide area network allowing communication from cell to cell or between cells and the Internet, etc. | |
| An (abstract) network representing a cellular network, usually in patterns that include implementation in at least one location in the form of a related logical subnet. | |
| An (abstract) network representing a cellular network, in this case the second such cellular network in a pattern. | |
| A public cellular network. | |
| A radio access network providing cellular network connectivity in a location. | 
| A context in which access rights may be held or gained. | |
| A context in which access rights are held and may be exploited. | |
| A context in which access rights may be obtained. | 
| A web browser. | |
| A text editor process, i.e. one that allows user interactions with data via a non-graphical login shell. | |
| A remote desktop client process. | |
| A Data Field used as output. | |
| A data asset that is a process output. | |
| A process facilitating (possibly specialised to support) user interactions with data. | |
| A desktop service, i.e. a service allowing access to a host via a remote desktop client. | |
| An editor process, i.e. one that allows user interactions with data. | |
| A process role, usually filled by a DB process supporting complex data queries. | |
| A data service role. | |
| A data role. | |
| A data asset that is a process input. | 
| A reverse proxy providing access to services that are deployed and managed automatically in a cloud data centre. | |
| A cloud deployment context for one or more Containers, modelled as a type of host. | |
| A virtual host configured to run a service that can be automatically deployed and managed in the cloud. | |
| A reverse proxy providing access to virtual host login and admin functions in a cloud data centre. | |
| An worker node in a virtual cluster supporting automated management of services in the cloud. | |
| An master node in a virtual cluster supporting automated management of services in the cloud. | |
| An overlay network connecting nodes in a virtual cluster supporting automated management of services in the cloud. | 
| Role used for DebugMarker assets when diagnosing construction patterns. | 
| A process from which data is flowing. | |
| A process that is the destination for an outbound data flow. | |
| A process to which data is flowing. | |
| A data flow to a process. | |
| A Data Asset that is inbound to a process. | |
| A data flow from a process. | |
| A data step from a process. | |
| A DataAccess asset relating to a remote access client used to enable user interaction with a remote process. | |
| A process from which data is transferred. | |
| A process to which data is transferred. | |
| Fulfilled by a process playing the role of key vault in relation to some data asset. | |
| A data access role associated with data used by a process. | |
| A Data Asset that is outbound from a Process. | |
| A data access asset associated with data consumed and altered by a process. | |
| A data step to a process. | |
| A data access asset associated with a source process. | |
| A data access asset associated with a source process. | |
| A data access role. | |
| A data asset role fulfilled by any serialised copy of data (i.e. data copy or data flow). | |
| A stored data copy created as a data flow cache. | |
| A data copy role. | |
| A data access asset associated with a destination process. | |
| A data access asset associated with a destination process. | |
| A flow of data between processes. | |
| A data access role associated with data consumed by a process. | |
| A data access role associated with data produced by a process. | |
| A data access role associated with data served by a process. | |
| A data access role associated with data used by a process. | |
| A data access role associated with data forwarding by a process. | |
| A process-to-process data movement, forming one step in a data flow. | 
| A data path used in construction patterns. | |
| A data channel used in construction patterns. | |
| A data path created in construction patterns. | |
| A data path used in construction patterns. | |
| A connection between processes indicating they can exchange data. | |
| A data channel used in construction patterns. | |
| A data channel created in construction patterns. | 
| A field in a data schema or serialized data asset. | |
| A Data Field used as input. | 
| An IoT Thing. | |
| An IoT Thing acting as a controller. | |
| An IoT Thing acting as a sensor. | 
| A jurisdiction (i.e. system of laws and regulations). | |
| A jurisdiction (i.e. system of laws and regulations) applicable far away. | |
| A natural or legal person responsible for collection and processing of personal data. | 
| A subnet representing the connection between paired hosts. | |
| A non-IP subnet representing a connection between paired hosts. | |
| A device that can be plugged into a USB Host. | |
| A host that has USB connectors into which USB devices may be plugged. | |
| A subnet representing the connection between paired hosts. | 
| A physical host. | |
| A remote access service. | |
| A remote access client. | |
| A radio subnet. | |
| A process. | |
| A user role assigned to managing a process. | |
| A host that is remote from some other asset or phenomenon. | |
| A context for access rights of a process. | |
| A physical subnet. | |
| A network connectivity context for access rights of a process. | |
| A remote access terminal process. | |
| A user role assigned to managing a service. | |
| A server. | |
| A process acting as a service, i.e. open to communication requests from clients. | |
| A host in a role where it supports a virtual host or service. | |
| A simple host. | |
| A simple process. | |
| A smart phone. | |
| A logical subnet. | |
| A trivial host unable to support shell access, e.g. a removable storage device or an IoT device. | |
| A process that is so trivial it is not subject to some types of threats. | |
| A wired local area network. | |
| A host acting as a router. | |
| A host that is not the first one found in a pattern. | |
| A WiFi network provided by a mobile device wherever it goes. | |
| A process acting as a Mail User Agent. | |
| A communication network that is implemented from a set of logical subnets. | |
| A stakeholder role with legal responsibility for operation of part or all of a system. | |
| A communication network that is accessible to attackers. | |
| A process acting as an authentication client to gain access to a network or service. | |
| A process providing authentication/authorisation services. | |
| A host role, usually one running a client process. | |
| A process acting as a client, i.e. initiating communication with a service. | |
| A host role filled by some form of a cluster. | |
| A host that users can log into and interacting with via a console. | |
| A backbone network role. | |
| A data centre role. | |
| A host, which may or may not be its own physical host. | |
| A general process. | |
| A host that provides a subnet and/or acts as a router between subnets. | |
| A mobile client supporting login (i.e. a notebook, tablet or smartphone). | |
| A logical subnet (i.e. a subnet that can be used for direct communication between connected hosts). | |
| A host that is local to some other asset or phenomenon. | |
| The Internet. | |
| A login service (i.e. a process that supports shell access to a host). | |
| A network connectivity context for access rights on a host. | |
| A user role assigned to managing a host. | |
| A context for access rights on a host. | |
| A host. | 
| A pre-existing network path from which other paths will be contructed. | |
| A host that is (or hosts) the destination of a message or data flow. | |
| Role assigned to a subpath of some other network path. | |
| A logical segment representing the return path for connections via a gateway. | |
| A physical network path. | |
| An interface via which communication enters a subnet from a host. | |
| A subnet at the end of a network path or communication channel. | |
| A constructed network path. | |
| A network path which may or may not be physical. | |
| A route through a gateway between subnets. | |
| A logical segment representing a route via a gateway. | |
| An interface between a host and a logical subnet. | |
| An interface via which communication enters a host from a subnet. | |
| A logical segment representing the forward path for connections via a gateway. | |
| A subnet at the start of a network path or communication channel. | |
| A host that is (or hosts) the source of a message or data flow. | |
| A path through the network, usually between a subnet accessible to attackers and a subnet to which a target host is connected. | 
| The (inferred) global public space. | |
| A space. | |
| A far away space. | |
| A nearby space. | |
| A space from which another space can be entered. | |
| A second or subsequent space in a pattern. | 
| A natural person who is the subject of personal data. | 
| A client channel representing the relationship between a process and a key vault holding keys used by the process to access data. | |
| A privileged communication path through the network between a client and a service. | |
| A privileged path through the network to a service from a subnet accessible by attackers whose messages would be addressed in a way that is consistent with at least one client. | |
| A process acting as a client to a reverse proxy. | |
| A client-service trust relationship existing between a client or service and an intervening reverse proxy. | |
| A process acting as a reverse proxy, relating requests between a client and a service. | |
| A privileged path through the network to a service from a subnet accessible by attackers whose messages are addressed in a way that is consistent with a specific client, and are not rewritten by a NAT gateway. | |
| Refers to a pre-existing subnet, which (if present) changes the significance of assets matching other roles in the same pattern. | |
| A client service trust relationship in a chain between a client and a service via a reverse proxy. | |
| A client service trust relationship between a client and a service that communicate indirectly. | |
| A client service trust relationship in a chain between a client and a service via a reverse proxy. | |
| A privileged path through the network to a service from a subnet accessible by attackers whose messages are addressed in a way that is consistent with at least one client, and are not rewritten by a NAT gateway. | |
| A process acting as a service. This role name is chosen so alphanumeric sorting puts it between client-related roles and the network path used by those clients to communicate with the service. | |
| The host of a service. This role name is chosen so alphanumeric sorting puts it between client-related roles and the network path used by those clients to communicate with the service. | |
| A privileged path through the network to a service from a subnet accessible by attackers whose messages are rewritten by a NAT gateway in a way that is consistent with at least one client. | |
| A privileged path through the network to a service from a subnet accessible by attackers whose messages are rewritten by a NAT gateway in a way that is consistent with a specific client. | |
| A network path to a service from a subnet through which messages from a specific client would pass. | |
| A trust relationship between a client and a service. | |
| A privileged path through the network to a service from a subnet accessible by attackers whose messages would be addressed in a way that is consistent with a specific client. | |
| A network path that provides a basis for attacks on services via NAT devices. | |
| A trust relationship between a client and a service that relates to the use of that service to verify third party access rights. | |
| A trust relationship between a client and a service that relates to the use of that service to authenticate the client and/or verify their access rights. | |
| A privileged path through the network to a service from a subnet accessible by attackers . | |
| A subnet on a path between client and service where messages from an attacker could join that path and benefit from newtork address translation en route to the service. | 
| A stakeholder role fulfilled by an human or an organisation. | |
| A stakeholder role fulfilled by an organisation, e.g. a company or a team. | |
| A user role fulfilled by a human. | |
| A user role fulfilled by a human. | |
| A Human who is not an Adult. | |
| A stakeholder that employs one or more individuals to act in one or more system roles. | |
| A human who is not a Child. | |
| A user role fulfilled by a human. | 
| A virtual host. | |
| A channel corresponding to a physical network path between two physical hosts, on which virtual network communication depends. | |
| A virtual subnet implemented witin a host to connect virtual hosts provisioned there. | |
| A role filled by a subnet that is an overlay of some other subnet(s). | |
| A scalable (virtual) host. | |
| A channel between two physical hosts connected by at least one physical network path, on which virtual network communication depends. | |
| A virtual subnet. |