website: security model is pretty important
This commit is contained in:
parent
058078cb50
commit
a3f9311161
|
@ -19,12 +19,6 @@ to access data or modify policy. All interactions must be auditable and traced
|
||||||
uniquely back to the origin entity. The system must be robust against intentional
|
uniquely back to the origin entity. The system must be robust against intentional
|
||||||
attempts to bypass any of its access controls.
|
attempts to bypass any of its access controls.
|
||||||
|
|
||||||
~> **Advanced Topic!** This page covers the technical details
|
|
||||||
of the security model of Vault. You don't need to understand these details to
|
|
||||||
effectively use Vault. The details are documented here for
|
|
||||||
those who wish to learn about them without having to go
|
|
||||||
spelunking through the source code.
|
|
||||||
|
|
||||||
# Threat Model
|
# Threat Model
|
||||||
|
|
||||||
The following are the various parts of the Vault threat model:
|
The following are the various parts of the Vault threat model:
|
||||||
|
|
Loading…
Reference in New Issue