• A Peer code review
  • B Design patterns for security
  • C Secure coding
  • D Architectural patterns for security