Security
1. Introduction
This is the security point of view. It describes all the measures implemented to prevent unauthorized use, misuse, illegitimate modification, or misappropriation of application modules.
2.2 Assumptions
3. Constraints
5.2 Confidentiality
Measures meeting the 4.2 Confidentiality Requirements
5.4 Authentication
Measures meeting the 4.4 Authentication Requirements
5.5 Identity federation
Measures meeting the 4.5 Identity Federation Requirements
5.6 SSO, SLO
Measures meeting the 4.6 SSO Requirements
5.7 Service accounts
5.8 Non-repudiation and timestamping
Measures meeting the 4.7 Non Repudiation Requirements