data-security
data-security copied to clipboard
Data Access Threat Modeling Methodology
Create a threat model of IAM and authorization systems.
I'll have a think about whether this is done or is part of other work we do. We can discuss whether to keep this a separate issue.