Audit Objectives

  • Validate secure storage access and ownership transfer logic

  • Identify unauthorised data mutation risks and boundary bypasses

  • Evaluate resistance to denial-of-service (DoS) and replay attacks

  • Verify traceability and data integrity protections

  • Confirm alignment with FCA’s expectations around system availability and auditability

Last updated