- Establish Security Requirements
- Create Quality Gates/Bug Bars
- Perform Security and Privacy Risk Assessments
- Establish Design Requirements
- Perform Attack Surface Analysis/ Reduction
- Deprecate Unsafe Functions
- Conduct Attack Surface Review
- Create an Incident Response Plan
- Conduct Final Security Review
- Certify Release and Archive
- Execute Incident Response Plan