Describe your system

Components, data stores, third parties, auth model, deployment topology. The more concrete the input, the sharper the threats.

examples:
0 chars · min 20