Architecture & Technical Design · master area
Security Architecture
Threat modelling, auth design, data protection. Re-read at every Epic that touches authorisation or PII.
Owner: Tech Lead Volume addressing it: IV
Where it lives
- This area is currently a gap in the corpus. It is named here for visibility; future cycles will produce a volume that addresses it.