Ensure that the various system actors, their access control privileges and trust assumptions are accurately specified in great detail so that they are correctly implemented and enforced across different contracts, functions and system transitions/flows.
- Access Control -> Assets/Actors/Actions
- Spec: Who/What/Why/When/How-Much
- Trust/Threat Model & Assumptions
- Spec -> Implement -> Enforce -> Evaluate