(
)
AC-3: Access Enforcement
SP-TE-36: Unauthorized changes or manipulation of information data records
1. API orchestration security pattern [Threat Model]
1. API inbound security pattern [Threat Model]
1. Outbound web security pattern [Threat Model]
1. API inbound security pattern [Threat Model]