DoctorEww / software-assurance

1 stars 3 forks source link

Assess how well security requirements match with the advertised security features. #21

Closed adamspanier closed 3 years ago

adamspanier commented 3 years ago

DEADLINE: TBD

In this final step, we'll look at our use, abuse, and security cases and see if the current state of security for the open source software matches the threat basis we discovered.

khang1215 commented 3 years ago

I've put together some stuff for the send text portion, however I am sure there are things that I missed. If anyone can QC my portion, it would be much appreciated.