Security is built-in, not bolted-on. Every feature, endpoint, and data flow must consider security implications.
| 1 | Broken Access Control | Verify permissions server-side, default deny | | 2 | Security Misconfiguration | Secure defaults, remove unused features | | 3 | Software Supply Chain Failures | SBOM, dependency scanning, signed builds | | 4 | Cryptographic Failures | Use TLS, hash passwords (argon2id), encrypt PII |
| 5 | Injection | Parameterized queries, input validation | | 6 | Insecure Design | Threat modeling, security requirements | | 7 | Authentication Failures | Strong passwords, MFA, secure session mgmt | | 8 | Software or Data Integrity | Verify dependencies, sign releases | | 9 | Logging and Alerting Failures | Log security events, set up alerts |