# Security Describe security assumptions and controls. Include: - authentication; - authorization; - network exposure; - TLS/certificates; - secrets management; - logging of sensitive data; - container privileges; - filesystem permissions; - dependency management; - relevant ADRs.