Richard is the CTO of an online bookstore and manages around 500 developers. Richard would like to work with the security team to apply standard security practices during the architecture review, design review, and third-party framework review, and also apply secure coding. Both Richard and the security team reached the consensus that they should have the following in order to prepare for the next stage of their business development:
- Secure design checklist
- Recommended secure design pattern
- A list of reusable third-party components
Let's look at how the security team helps Richard through the stages of development.