Create a threat model of IAM and authorization systems.
Create a threat model of IAM and authorization systems.