-
Story
-
Resolution: Done
-
Normal
-
RHODS_1.1_GA
-
None
Need to provide Judy with the following
1. Data flow diagram: Runtime use case - how the user and data can flow through the system, Where data is stored, how it’s encrypted in transit
2. Judy needs access to cluster where RHODS is deployed
Acceptance Criteria: Complete Threat model document: https://docs.google.com/document/d/17sGYy8P3HSCpO7QeSSORU3ZUYkUNGQq-z3xJDrUyadM/edit?ts=6050c0e9#