Slide 75
Slide 75 text
To build dependable systems:
1. Unique keys in every machine.
2. Keys safely provisioned, stored, rotated, revoked.
3. End-to-end mutual authentication at the application layer.
4. End-to-end guarantee of data integrity.
5. End-to-end guarantee of data con
f
i
dentiality.
6. Granular management of credentials, enforcement of policies.