security design
Closed this issue · 0 comments
gsvarovsky commented
Design of security controls against the identified threats from #1.
integrity
- Integrity of information, so that it can only be written by identified and authorised actors. The design will consider fine-grained access control, for example to 'schema' metadata (the definitions of data correctness for a domain) and to the access control lists, which my be embedded in the domain data itself.
The expectation is that the solution will involve strong (cryptographic) binding of access control (however implemented) to user or system identities. In some cases data authority may not correctly be represented as an access control list, and so the design will allow for external authority models such as consensus and permissionless protocols.- integrity design documentation in GitHub
traceability
- Traceability and non-repudiation of information is often mandated in regulated systems. This is
typically well addressed in blockchain-based systems but not directly in real-time collaborative data
structures. The design will consider how to record data operations with strong (cryptographic)
binding to user identities.
As promised in https://m-ld.org/doc/#security
Archived Google doc WIP