diff --git a/docs/data-sovereignty/PolicyConfigGuide.md b/docs/data-sovereignty/PolicyConfigGuide.md
index 9549bd685..70692c731 100644
--- a/docs/data-sovereignty/PolicyConfigGuide.md
+++ b/docs/data-sovereignty/PolicyConfigGuide.md
@@ -163,17 +163,17 @@ In this documentation some points and resources will be indicated:
If Auto sign setting is enabled, the first valid contract policy checked against the configuration is always chosen as shown in below screenshot.
The passport is shown to the user as shown in a [Passport Page](../user/UserManual.md#passport-page).
-![Loading Product Pass](../user%20manual/media/loadingPass.png)
+![Loading Product Pass](../user/media/loadingPass.png)
### Manual Negotiation
This feature requires user action. If disabled, the contract policy must be choosen by the user from the popup menu during the loading process.
-![Before Contract Policy Selection](../user%20manual/media/beforePolicySelection.png)
+![Before Contract Policy Selection](../user/media/beforePolicySelection.png)
The sign feature basically signs the contract policy before the contract negotiation is done. The right contract policy must be selected by the user, otherwise the contract negotiation is aborted and user is returned back to the [Main Menu](../user/UserManual.md#main-menu).
-![Agree Contract policy](../user%20manual/media/agreePolicy.png)
+![Agree Contract policy](../user/media/agreePolicy.png)
### Agree Contract
@@ -192,16 +192,16 @@ In case the user want to see more details from the policy, it can be done by cli
> **_NOTE:_**
*The contract policy is always checked against the defined asset Id in a target field*
-![View Contract Policy](../user%20manual/media/viewPolicy.png)
+![View Contract Policy](../user/media/viewPolicy.png)
The user accepts the right contract policy, and click on the **Agree** button which resumes the remaining negotiation and data transfer steps. In the end, the passport data is retrieved and displays to the user [Passport Page](../user/UserManual.md#passport-page).
-![After Contract Policy Selection](../user%20manual/media/afterPolicySelection.png)
+![After Contract Policy Selection](../user/media/afterPolicySelection.png)
#### Decline Contract
If a user is not permitted to accept a particular policy from his company, the contract policy can be declined in this case. The user will be redirected to the [Main Menu](../user/UserManual.md#main-menu).
-![Decline Contract Policy](../user%20manual/media/declinePolicy.png)
+![Decline Contract Policy](../user/media/declinePolicy.png)
# Examples
diff --git a/docs/security/security_assessment.md b/docs/security/security_assessment.md
new file mode 100644
index 000000000..c8c46745d
--- /dev/null
+++ b/docs/security/security_assessment.md
@@ -0,0 +1,321 @@
+
+
+# Security Assessment Product Passport Application
+
+| Contact | Details |
+| ------------------------- | ---------------------------------------------------------------------------------------------------- |
+| Contact for product | https://github.com/matbmoser |
+| Security responsible | [@SSIRKC](https://github.com/SSIRKC)
[@szymonkowalczykzf](https://github.com/szymonkowalczykzf) |
+| Version number of product | 24.05 |
+| Dates of assessment | 2024-05-13: Re-Assessment |
+| Status of assessment | RE-ASSESSMENT DONE & Approved |
+
+## Product Description
+
+The Digital Product Passport App is Internet facing web app designed with a purpose of disclosing details about battery (and others products in the future) products for authenticated & authorized users.
+Within the Catena-X Network, Product Passports are provided by manufacturers and can be exchanged in a standardized way. The data exchange standards are given by Catena-X and are used provide the product passport to different users in the network.
+This passports can be used for different products like Batteries, Gearboxes, etc. At the moment the only product implemented are batteries, so the user interface only displays product passports. In the near future it will be able to display any passport structure, over a generic product passport that is in development at the moment.
+The product passport consumer app provides an easy way to request a product passport from a manufacturer using the Catena-X network and standardized components and technologies. The passport will be displayed user-readable in an common browser. The app is used to access the passport data, which is provided by a manufacturer. Another interesting feature, is that you are able to scan a QR-code or by knowing the manufacturer and product-ID a user can request the passport over the Catena-X. On the other end, the manufacturer will provide passports with data elements, that the signed-in user is allowed to see the detailed information from a product.
+This application is developed by the Product Passport Team, one of the members from Catena-X Circular Economy Team, aiming to contribute to the environmental cause, allowing recyclers, OEMs and dismantlers to know properties, dimensions and other important data related with a current product or material.
+The product passport consumer app is an web-based application developed in Vue.js, making it accessible using standard browsers (Chrome, Edge, Firefox, etc) for any user in the Catena-X Network.
+It displays a specific passport for each product, in the Catena-X network hosted in a backend system. Using the Catena-X data exchange standards to request and receive data from the network it leverages the users and roles provided by Catena-X by using the required shared components (IAM, EDC, SSI, EDC Discovery, Discovery Finder and BPN Discovery) as well as the new Decentral DT-Registry.
+The product passport consumer app UI follows the Catena-X CI layout, keeping things simple for the user while still providing the necessary information.
+
+An User can request a passport:
+* Either by scanning a QR-code which leads to the a passport view UI, allowing the user to visualize all the necessary/required information of a product. Making easier to dismantle it.
+* In case a QR is not provided, the user is able to introduce the product id manually in a search field.
+As the data provider might not send every data field regarding to the users privileges, the application is flexible with its layout and data handling, displaying only what it receives.
+
+## Scope of the review
+
+| ID | Component Description |
+| --- | --------------------------------- |
+| 1 | Authentication Service |
+| 2 | Digital Product Passport Frontend |
+| 3 | Digital Product Passport Backend |
+
+## Components out of scope of the review
+
+| ID | Component Description |
+| --- | -------------------------------------- |
+| 1 | CX Portal |
+| 2 | IAM Registry - Keycloack |
+| 3 | HashiCorp Vault |
+| 4 | Digital Twin Registry |
+| 5 | Dynamic Attribute Provisioning Service |
+| 6 | EDC Discovery |
+| 7 | Discovery Finder |
+| 8 | BPN Discovery |
+
+## Security Control Design
+
+Current state of the security controls already implemented within the application.
+
+Authentication, authorization - Product Passport App is using Catena - X Portal authentication & authorization mechanism, it's implemented according to CX policies & requirements, with the usage of CX Keycloak & secure way of populating the privileges with the usage of tokens.
+Session Management - Session timeout limit for users is set for 300 seconds. Session IDs are not transmitted in the URLs, concurrent session (one user logging on 2 different devices) is possible.
+File Upload / Download -Product Passport app do not have any features for file downloads or uploads.
+Encryption - Product Passport application is using secure encryption channel for all data in transit with the usage of HTTPS & TLS. All interactions with other C-X applications require compliance with the C-X security standards. Passport application is not storing the processed data.
+
+
+Authentication & Authorization Concept:
+
+Passport App Authentication & Authorization concept is fully dependable on Catena - X Portal authentication. Only authenticated in C-X Portal Users may access the Passport Application.
+Application authentication is populated with usage of token generated by CX Portal Keycloak.
+Passport Application currently have 4 users roles available for interested users. Authorization data is stored securely within Passport application secret storage.
+Users without roles assignment are not authorized to access the application.
+
+Additionally all of the users that authenticate within the Application have to be compliant with BPN Checks.
+That means that all user's BPN number have integrity check in place comparing it with the BPN number associated to that users within EDC.
+
+
+Please find roles description below :
+OAM - allowing a set of details available only to the authorized personnel
+Dismantler - allowing a set of details available only to the authorized personnel
+Recycler - allowing a set of details available only to the authorized personnel
+Public customer - allowing a set of details available to everyone with access to the product ID (The role is still under implementation)
+
+
+## Diagrams
+
+```mermaid
+flowchart TD
+ A(Customer \n Human User)
+ B(Passport Front End)
+ C(CX Portal - IAM Registry - Keycloack)
+ D(HashiCorp Vault -Secret Management Vault)
+ E(Discovery Service)
+ F(BPN Discovery)
+ G(EDC Discovery)
+ H(Authentication Service / Authentication Controller)
+ I(API Controller & Contract Controller)
+ J(Endpoint API)
+ K(SSI - Self Sovereign Identity - Identity Services)
+ L(EDC - C-X Instance - Proxy)
+ M(EDC - Data Provider Instance)
+ N(Provider Data Storage)
+ O(DTReg - Data Twin Registry)
+ subgraph Internet Boundary
+ subgraph Data Consumer Environment
+ A
+ end
+ subgraph Customer Web Browser - Usage of Vue.js 3 Framework
+ B
+ end
+end
+subgraph Catena - X Environment - Cloud
+ C
+ D
+ E
+ F
+ G
+ K
+ L
+ subgraph Isolated Passport App Back End Kubernetes Container
+ H
+ I
+ J
+ end
+ end
+subgraph Data Provider Environment
+M
+N
+O
+ end
+A-->|1.0 Access the Passport Web App \n 3.0 Request for a passport by ID search or QR Code Scan \n 5.0 Visualize requested data \n HTTPS|B
+B-->|1.1 Access to CX Portal \n 1.2 Login in CentralIP - CX Shared Service \n 1.3 GET HTTP Request - Authentiction Authorization Token - 5 min \n HTTPS|C
+C-->|Forwarding the token \n HTTPS |B
+H-->|2.2 GET HTTPS Request for User Session|C
+H-->|2.3 Grants access to the app with confirmed role \n HTTPS|B
+C-->|User information \n Basic User Information \n No secrets-|H
+I-->|0.0 Secret Sotrage \n Vault Services Used for the storage of API Keys, \n IAM client IDs & secrets for token requests \n HTTPS|D
+I-->|0.0 It is done on the startup of the application. \n Looking for source to search more dicovery services \n IAM Authenticated \n HTTPS|E
+I-->|Looking for BPN for Manufacturer parts ID \n IAM Authenticated \n HTTPS|F
+I-->|Looking for EDC Endpoint with the BPN Number \n IAM Authenticated \n HTTPS|G
+I-->|4.1 Request Data for products \n from data providers \n HTTPS|L
+J-->|Data Request with Token \n HTTPS|L
+L-->|EDR - product passport receive token \n HTTPS|J
+I-->|Authentication services|H
+B-->|3.1 Get request of assetID of product \n 3.3 Get submodel endpoints \n 4.0 Request Data for products \n HTTPS|I
+M-->|4.2.1 Identity Confirmation Service \n HTTPS|K
+L-->|4.2.1 Identity Confirmation Service \n HTTPS|K
+L-->|4.2 Contract Negotiation & Request Data from dataplane \n HTTPS|M
+M-->|3.2 Forwarding Get request of assetID of product \n 3.4 Forwarding Get request of submodel endpoints HTTPS|O
+M-->|4.3 Get & Return Data from Submodel Server|N
+```
+
+
+
+
+## Vulnerabilities & Threats
+
+| V001 | Log forge attack into application through frontend console.log() |
+| ----------------- | -------------------------------------------------------------------- |
+| Element | Product Passport Application |
+| Before Mitigation | Impact: Medium, Likelihood: Low, Risk: Low |
+| After Mitigation | Impact: Low, Likelihood: Low, Risk: Low |
+| Mitigation | Implement logging in backend system, instead of logging in frontend. |
+
+| V002 | Secrets for Keycloak instance are exposed in frontend component. |
+| ----------------- | ----------------------------------------------------------------------------------------- |
+| Element | Product Passport Application |
+| Before Mitigation | Impact: Medium, Likelihood: Medium, Risk: Medium |
+| After Mitigation | Impact: Low, Likelihood: Low, Risk: Low |
+| Mitigation | Implement GitGuardan, Veracode and migrate the login in Keycloak instance to the backend. |
+
+| V003 | Integration between backend and frontend can generate vulnerabilities. |
+| ----------------- | ---------------------------------------------------------------------- |
+| Element | Product Passport Application |
+| Before Mitigation | Impact: Medium, Likelihood: Medium, Risk: Medium |
+| After Mitigation | Impact: Low, Likelihood: Low, Risk: Low |
+| Mitigation | Test the code and scan for attack surface with Veracode. |
+
+| V004 | Login password credentials are too weak and can be brute forced easily. |
+| ----------------- | ----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- |
+| Element | Product Passport Application |
+| Before Mitigation | Impact: High, Likelihood: Medium, Risk: High |
+| After Mitigation | Impact: Low, Likelihood: Low, Risk: Low |
+| Mitigation | Change access passwords in Keycloak instance. Recommendation is aimed for the password policies managed by the C-X Portal Team. Product Passport App is just using them in a Black Box approach. Risk Transferred |
+
+| V005 | Fields and the usage of GET methods for searching are an open door to SQL Injection attacks. |
+| ----------------- | -------------------------------------------------------------------------------------------- |
+| Element | Product Passport Application |
+| Before Mitigation | Impact: High, Likelihood: High, Risk: High |
+| After Mitigation | Impact: Low, Likelihood: Low, Risk: Low |
+| Mitigation | Implement a filter for not allowed characters. |
+
+| V006 | XSS attacks can be performed by attacking ID searching in product passport using GET Method. Leading to exposal of sensible information. |
+| ----------------- | ---------------------------------------------------------------------------------------------------------------------------------------- |
+| Element | Product Passport Application |
+| Before Mitigation | Impact: High, Likelihood: High, Risk: High |
+| After Mitigation | Impact: Low, Likelihood: Low, Risk: Low |
+| Mitigation | Add filters for XSS characters and injection of