Modell authentication and device verification based on the initial thread modelling

Problem

Authentication and device verification has intricate dependencies on each other and the thread modelling specifically. We want to be able to reason about the architecture

Goal

Create initial documentation relating to the threat modelling, describing authentication and device verification. With this documentation we can reason about and iteratively improve our view on these topics.

ACs

  • [ ]

Notes/ resources

Requirements uIDs: Zapuk_108

Who needs to be involved / informed

  • reviewers:
  • involved: ARC
  • informed:
Edited by Robert Gerbauld