cancel
Showing results for 
Show  only  | Search instead for 
Did you mean: 
cancel
Showing results for 
Show  only  | Search instead for 
Did you mean: 
Highlighted
Newcomer I

Threat modelling and securing AaaS (Authentication as a service)

Hi 

I wonder if anyone has come across any articles or blogs on threat modelling and securing Authentication as a Service? There are quite a number of AaaS available on AWS and I am trying to figure out some guidelines are criteria to chose and secure the use of AaaS on our applications.  Thanks