- Architecture overview
- Implementation and documentation
- Syslog clients
- Syslog accumulator
- Database schema
- Monitor
- Integration patterns
- Availability concerns
- Failure patterns and mitigations
- Related concerns / Best practices for credential stores
- Protection against password theft (vs guessing)
- "Backoff" procedures
- CAPTCHA
- IP address tracking