Security

Threat modeling, access control, audit trails, secrets handling, and practical review checklists.