data-security icon indicating copy to clipboard operation
data-security copied to clipboard

Data Access Threat Modeling Methodology

Open TomConner opened this issue 1 year ago • 1 comments

Create a threat model of IAM and authorization systems.

TomConner avatar Nov 21 '24 12:11 TomConner

I'll have a think about whether this is done or is part of other work we do. We can discuss whether to keep this a separate issue.

TomConner avatar Aug 11 '25 18:08 TomConner