Audit Objectives
Validate secure storage access and ownership transfer logic
Identify unauthorised data mutation risks and boundary bypasses
Evaluate resistance to denial-of-service (DoS) and replay attacks
Verify traceability and data integrity protections
Confirm alignment with FCA’s expectations around system availability and auditability
Last updated