Security/ProcessIsolation: Difference between revisions

Line 20: Line 20:
* Develop a detailed threat model to understand how threats will be mitigated and where we might run into implementation problems for the given architecture
* Develop a detailed threat model to understand how threats will be mitigated and where we might run into implementation problems for the given architecture
* Figure out how to address any design or implementation issues discovered
* Figure out how to address any design or implementation issues discovered
* Iterative the above 3 steps
* Iterative the above 3 steps as necessary
* Implementation roadmap
* Implementation roadmap
** Identify components affected and respective developers
** Identify components affected and respective developers
** Figure out milestones and beta requirements
** Figure out milestones and beta requirements
** Budget and schedule for external security review
** Budget and schedule for external security review
Confirmed users
717

edits