Security design review process
flowchart LR
A((start)) --> B(planning & prep) --> C(threat modeling) --> D(architecture implementation review) --> E
flowchart LR
A((start)) --> B(planning & prep) --> C(threat modeling) --> D(architecture implementation review) --> E