Compliance and Application Security

Use the following checklist:

Done? Security Controls and Recommendations
Check box Classify data used by each of your applications.
Check box Configure data controls to meet your classification requirements.
Check box Configure application-level network controls.
Check box Configure application-level authentication, authorization, and access control for users.
Check box Configure a WAF for web applications.
Check box Configure application-level monitoring, logging, and auditing.
Check box Follow all the security best practices for your applications.
Check box Identify and configure all the compliance controls and regulatory requirements.