Resources
This section contains ready-to-use compliance and assessment tools to help you implement secure-by-design practices in your projects.
-
Checklists & Worksheets: Tools for gap analysis and maturity modeling.
-
Policy & Evidence: Templates for key documents like a Coordinated Vulnerability Disclosure (CVD) policy.
-
Example Documents: Concrete examples of key compliance documents, like a threat model, to use as a template.
-
Real-World Vulnerabilities: Case studies of security incidents and how a secure-by-design approach could have helped.
-
Reference: Supporting materials like the Glossary and Tool Directory.