Skip to content

Security Architecture

Threat modelling, auth design, data protection. Re-read at every Epic that touches authorisation or PII.

Owner: Tech Lead Volume addressing it: IV

Where it lives

  • This area is currently a gap in the corpus. It is named here for visibility; future cycles will produce a volume that addresses it.

200apps · How We Work · NWIRE