Total hours: 246.000
Split into three seperate levels to plan and design based on threat and security requirements instead of providing just one size fits all.
Despite that being what I wanted from the get go and to design an application with 0 settings or close to 0. But really wanted 0 settings options.
This is different than than authentication. It’s designed to be a second layer of design for cautious or strict mode.
3) Key Management