Assess that a secure and production-ready configuration is deployed.
Validate all input fields against generic attacks.
Ensure that proper access controls are applied.
Evidence:
Last updated 1 month ago