Covers authentication (TOTP, WebAuthn, mTLS, OAuth), authorization
(RBAC, resource permissions), transport security, secrets management,
audit logging, prompt injection defense, and rate limiting.
Includes open questions and implementation checklist.
Co-Authored-By: Claude Opus 4.5 <noreply@anthropic.com>