⚠️ work in progress
- Appropriate authentication
- Protect secret data
- Don’t store secrets
- Appropriate authorization
- Hashes
- MACs
- Digital signatures
- Tamper resistant protocols
- Digital signatures
- Timestamps
- Audit trails
- Authorization
- Privacy-enhanced protocols
- Encryption
- Protect secrets
- Don’t store secrets
- Appropriate authentication
- Appropriate authorization
- Filtering
- Throttling
- Quality of service
- Least Privilege
See THREAT_MODEL.md