Modell authentication and device verification based on the initial thread modelling
Problem
Authentication and device verification has intricate dependencies on each other and the thread modelling specifically. We want to be able to reason about the architecture
Goal
Create initial documentation relating to the threat modelling, describing authentication and device verification. With this documentation we can reason about and iteratively improve our view on these topics.
ACs
- [ ]
Notes/ resources
Requirements uIDs: Zapuk_108
Who needs to be involved / informed
- reviewers:
- involved: ARC
- informed:
Edited by Robert Gerbauld