Software Engineering KB

Home

❯

05 Software Design and Architecture

❯

05 System Design Tradeoffs

❯

01 Concept

❯

Security Review

Security Review

Feb 10, 20261 min read

  • tradeoffs
  • design-review
  • security

Security Review

← Back to Design Review Checklist

What are the trust boundaries? How is auth handled? What data is sensitive? Consider authentication, authorization, encryption in transit and at rest, input validation, and attack surface minimization.

Key Properties

  • Trust Boundaries
  • Data Classification
  • Attack Surface

tradeoffs design-review security


Graph View

  • Security Review
  • Key Properties

Backlinks

  • Design Review Checklist

Created with Quartz v4.5.2 © 2026

  • GitHub