...
- Security profiles
- Profiles about data model things
- But also actual security profiles (levels of response based on the location of the device)
- Intrusion Detection System (IDS)
Jira server BBF Jira columnIds issuekey,summary,issuetype,created,updated,duedate,assignee,reporter,priority,status,resolution columns key,summary,type,created,updated,due,assignee,reporter,priority,status,resolution serverId d92875e6-bce1-3b6b-a909-e9268944d601 key DEV2DM-324 - Security flows - hardware acceleration
- Flow identification
- Physical security alerts/status
- Provisioning of CPE Certificates used for mutual authentication -
Jira server BBF Jira columnIds issuekey,summary,issuetype,created,updated,duedate,assignee,reporter,priority,status,resolution columns key,summary,type,created,updated,due,assignee,reporter,priority,status,resolution serverId d92875e6-bce1-3b6b-a909-e9268944d601 key DEV2DM-913 - Device fingerprinting/identification
- Type, OS, version, etc.
- Theories of Operation for Security using stuff that exists
- Getting ToO from security app vendors and look for gaps
- Gap analysis with prpl
Talk id talk-7883
For Our Protocols
For Messaging
...