• A Improved documentation
  • B Comprehensive security requirements checklist
  • C More time spent on requirements elicitation
  • D Adding additional checkpoints