As we gear up to deploy our Jitsi Meet into a production environment,
exposed to the outside world, is there any documentation/reviews of the
security of Jitsi Meet that I can point our Security Manager at?
After things like ..
* Recommended security hardening processes specific to Jitsi Meet (and
associated tools) that should be applied to an existing hardened
* Management processes that the Jitsi Meet team(s) have and use to
respond to security bugs & exploits.
* QA processes in place to ensure rogue code doesn't get into the
source (and packages).