2.5 Securing backend modules
Providing a backend modules eventually grants access to internal computation resources. As these resources require a high level of security, we need to discuss how to secure the communication with the backend modules and prevent unauthorized access.
The outcome of this user story will be a description of methods that can optionally be implemented to secure this communication within the de-messaging-framework.
The development team will come up with a set of measures (scheduler, 2FA, token-authentication) and present this to the team. Ideally we have someone in the team with experience in IT security and authentication standards to discuss this.
The development team will revise the list of methods to secure the computation resources and discuss it again in the second meeting with the team.
related User Story (Hereon internal access only): #238