SecuritySecurity TLS Underlying implementationFIPS 140-2Enabling certificate verificationCertificate selectionSecret discovery service (SDS)OCSP StaplingAuthentication filterCustom handshaker extensionTrouble shooting JSON Web Token (JWT) AuthenticationExternal Authorization Service Definition Role Based Access Control PolicyShadow PolicyCondition Threat model Confidentiality, integrity and availabilityData and control planeCore and extensions External dependencies Data plane (core)Data plane (extensions)Control planeAPIObservability (core)Observability (extensions)BuildMiscellaneousTest only Google Vulnerability Reward Program (VRP) RulesThreat modelExecution environmentObjectivesWorking with the Docker imagesRebuilding the Docker image