Summary
In this chapter, we discussed additional security requirements for applications, including prioritizing mitigating threats, standards for onboarding new applications, and security strategies for applications and APIs.
In the next chapter, we will discuss designing a strategy for securing data and mitigating threats, including mitigating threats to data, identifying and protecting sensitive data, and data encryption standards.