Disclaimer: It is still under research, this guide can be extended.

Security Checklist

Review Methodology