- Threat modeling:
- Tables with entry points, assets, trust levels
- Data flow diagrams
- Threats summary table
- Web security
- Keycloak:
- Setting up authentication and role-based authorization.
- Configuring the fine-grained authorization services
- Configuring User-Managed Access
- Audit capabilities