Slide 6
Slide 6 text
In a typical security review...
• Reviewers determine threat analysis after learning
about the system specification, user stories and
data flow.
• Reviewers run scans and do manual code review
• Reviewers signs and publishes security review
report (mitigations, and vulnerabilities)