Confirmed users
717
edits
Line 20: | Line 20: | ||
* Develop a detailed threat model to understand how threats will be mitigated and where we might run into implementation problems for the given architecture | * Develop a detailed threat model to understand how threats will be mitigated and where we might run into implementation problems for the given architecture | ||
* Figure out how to address any design or implementation issues discovered | * Figure out how to address any design or implementation issues discovered | ||
* Iterative the above 3 steps | * Iterative the above 3 steps as necessary | ||
* Implementation roadmap | * Implementation roadmap | ||
** Identify components affected and respective developers | ** Identify components affected and respective developers | ||
** Figure out milestones and beta requirements | ** Figure out milestones and beta requirements | ||
** Budget and schedule for external security review | ** Budget and schedule for external security review |