SecuritySecurity Threat model Confidentiality, integrity and availabilityData and control planeCore and extensions Google Vulnerability Reward Program (VRP) RulesThreat modelExecution environmentObjectivesWorking with the Docker imagesRebuilding the Docker image TLS Underlying implementationFIPS 140-2Enabling certificate verificationCertificate selectionSecret discovery service (SDS)Authentication filterTrouble shooting JSON Web Token (JWT) AuthenticationExternal Authorization Service Definition Role Based Access Control PolicyShadow PolicyCondition