Table of contents Welcome Introduction to the Project The Team Who We Aim to Help Get Started Four Lenses 🧑🤝🧑 PEOPLE Foundations Stakeholder Experiences Beyond Technology Threats to Success 🧗 PROCESS Holistic Assessment Approach Threat Modeling and Mitigations Software Bill of Materials An Iterative Process Recommended Skillsets Assessment Methodology Assets for Review ⬇️ Request of Assets PDF Application Architecture Source Code Security Vulnerability Scanning Penetration Testing ⬇️ Penetration Testing Slide Deck Development+Security+Operations DevSecOps Checklist ⬇️ DevSecOps Checklist Slide Deck ⬇️ Sample Technical Assessment Template 🚀 TECHNOLOGY Our Technical Findings Management Strategies Source Code Conundrums Physical Realities 🏫 PARTNERS Choosing a Partner Checklist for Success* Partner Assessments "The Turn-Key Solution" "The Open Platform" "The Custom Software Development Kit" "The Cloud Software-as-a-Service" Managing Risk at Scale Resources, Links & Tools Additional Resources Glossary 📸 Attributions