ietf-wg-cats / draft-ietf-cats-usecases-requirements

Other
0 stars 3 forks source link

CATS security requirements and considerations #8

Open bpatient78 opened 1 week ago

Maisy-ML commented 4 days ago

Compromised or malicious computing resources will bring threats to network and services of users, such as data of services maybe stolen, output of computing services may have deviations and other computing resources are attacked by the compromised resources that collaborate with them for computation. Therefore, R24: When making service decisions, the security status of resources should be taken into consideration.