Security Review
← Back to Design Review Checklist
What are the trust boundaries? How is auth handled? What data is sensitive? Consider authentication, authorization, encryption in transit and at rest, input validation, and attack surface minimization.