Table of contents Overview – Security Standards Background Layered Security Mapping layered security with AA ecosystem APIs API Design Strategy Best Practices Annexures Annexure A – Business Layer Security – End-to-End Encryption Annexure B – Application Layer Security – JWS Signature Annexure C – Protocol Layer security – Payload Encryption using TLSv1.2