DOWNLOADABLE RESOURCES

Resource Library

Policy templates, security checklists, how-to guides, and infographics to support your secure development practice.

📄
Template Track 1: Foundations

SSDLC Policy Template

DOCX file Download
📄
Template Track 1: Foundations

AI Acceptable Use Policy Template

DOCX file Download
Foundations & Governance Overview
Infographic Track 1: Foundations

Foundations & Governance Overview

PNG file Download
SSDLC Phase Map
Infographic Track 1: Foundations

SSDLC Phase Map

PNG file Download
Shift-Left Security Economics
Infographic Track 1: Foundations

Shift-Left Security Economics

PNG file Download
Defense in Depth in the SDLC
Infographic Track 1: Foundations

Defense in Depth in the SDLC

PNG file Download
OWASP Top 10
Infographic Track 1: Foundations

OWASP Top 10

PNG file Download
CIS CG16 Safeguard Map
Infographic Track 1: Foundations

CIS CG16 Safeguard Map

PNG file Download
✅
Checklist Track 1: Foundations

CIS CG16 Implementation Checklist

PDF file Download
Regulatory Framework Comparison
Infographic Track 1: Foundations

Regulatory Framework Comparison

PNG file Download
✅
Checklist Track 1: Foundations

Regulatory Compliance Matrix

PDF file Download
📄
Template Track 1: Foundations

AI Governance Charter Template

DOCX file Download
📘
How-To Track 1: Foundations

How to Implement AI Governance

PDF file Download
AI Tool Classification
Infographic Track 1: Foundations

AI Tool Classification

PNG file Download
📄
Template Track 2: Design

Security Requirements Specification Template

DOCX file Download
📘
How-To Track 2: Design

How to Write Security Requirements Using ASVS

PDF file Download
Design & Architecture Overview
Infographic Track 2: Design

Design & Architecture Overview

PNG file Download
Secure Design Principles
Infographic Track 2: Design

Secure Design Principles

PNG file Download
✅
Checklist Track 2: Design

Secure Design Principles Checklist

PDF file Download
✅
Checklist Track 2: Design

Threat Modeling Checklist

PDF file Download
📘
How-To Track 2: Design

How to Conduct a Threat Model

PDF file Download
STRIDE Threat Categories
Infographic Track 2: Design

STRIDE Threat Categories

PNG file Download
Cryptography Standards Quick Reference
Infographic Track 2: Design

Cryptography Standards Quick Reference

PNG file Download
✅
Checklist Track 2: Design

Cryptography Standards Checklist

PDF file Download
📘
How-To Track 2: Design

How to Implement Cryptographic Agility

PDF file Download
Architecture Security Assessment Process
Infographic Track 2: Design

Architecture Security Assessment Process

PNG file Download
✅
Checklist Track 2: Design

Architecture Security Assessment Checklist

PDF file Download
📄
Template Track 2: Design

Privacy Impact Assessment Template

DOCX file Download
Privacy by Design Principles
Infographic Track 2: Design

Privacy by Design Principles

PNG file Download
✅
Checklist Track 3: Implementation

Secure Coding Practices Checklist

PDF file Download
Secure Implementation Overview
Infographic Track 3: Implementation

Secure Implementation Overview

PNG file Download
✅
Checklist Track 3: Implementation

AI-Augmented Coding Safety Checklist

PDF file Download
📘
How-To Track 3: Implementation

How to Write Secure AI Prompts

PDF file Download
The RCI Pattern
Infographic Track 3: Implementation

The RCI Pattern

PNG file Download
Security Library Evaluation
Infographic Track 3: Implementation

Security Library Evaluation

PNG file Download
📘
How-To Track 3: Implementation

How to Build an Approved Component Registry

PDF file Download
✅
Checklist Track 3: Implementation

Secure Code Review Checklist

PDF file Download
Secure Code Review Process
Infographic Track 3: Implementation

Secure Code Review Process

PNG file Download
✅
Checklist Track 3: Implementation

API Security Checklist

PDF file Download
OWASP API Security Top 10
Infographic Track 3: Implementation

OWASP API Security Top 10

PNG file Download
✅
Checklist Track 4: Configuration

Repository Security Hardening Checklist

PDF file Download
📘
How-To Track 4: Configuration

How to Set Up Commit Signing

PDF file Download
Configuration Management Overview
Infographic Track 4: Configuration

Configuration Management Overview

PNG file Download
Release Gate Workflow
Infographic Track 4: Configuration

Release Gate Workflow

PNG file Download
📄
Template Track 4: Configuration

Change Management Policy Template

DOCX file Download
Testing & Verification Overview
Infographic Track 5: Testing

Testing & Verification Overview

PNG file Download
Security Testing Pyramid
Infographic Track 5: Testing

Security Testing Pyramid

PNG file Download
Security Testing Automation Pipeline
Infographic Track 5: Testing

Security Testing Automation Pipeline

PNG file Download
✅
Checklist Track 5: Testing

Security Testing Pipeline Checklist

PDF file Download
📘
How-To Track 5: Testing

How to Integrate SAST and DAST in CI/CD

PDF file Download
Penetration Testing Methodology
Infographic Track 5: Testing

Penetration Testing Methodology

PNG file Download
📘
How-To Track 5: Testing

How to Scope and Execute a Penetration Test

PDF file Download
AI-Generated Code Validation
Infographic Track 5: Testing

AI-Generated Code Validation

PNG file Download
✅
Checklist Track 5: Testing

AI-Generated Code Verification Checklist

PDF file Download
✅
Checklist Track 6: Deploy

CI/CD Pipeline Security Checklist

PDF file Download
Build, Deploy & Operations Overview
Infographic Track 6: Deploy

Build, Deploy & Operations Overview

PNG file Download
Secure CI/CD Pipeline
Infographic Track 6: Deploy

Secure CI/CD Pipeline

PNG file Download
✅
Checklist Track 6: Deploy

SBOM Generation & Verification Checklist

PDF file Download
📘
How-To Track 6: Deploy

How to Generate and Consume SBOMs

PDF file Download
SBOM & Supply Chain Security
Infographic Track 6: Deploy

SBOM & Supply Chain Security

PNG file Download
Supply Chain Attack Vectors
Infographic Track 6: Deploy

Supply Chain Attack Vectors

PNG file Download
📘
How-To Track 6: Deploy

How to Defend Against Dependency Supply Chain Attacks

PDF file Download
📄
Template Track 6: Deploy

Secrets Management Policy Template

DOCX file Download
Secrets Management Lifecycle
Infographic Track 6: Deploy

Secrets Management Lifecycle

PNG file Download
✅
Checklist Track 6: Deploy

Container Security Checklist

PDF file Download
Container Security Layers
Infographic Track 6: Deploy

Container Security Layers

PNG file Download
Environment Separation Architecture
Infographic Track 6: Deploy

Environment Separation Architecture

PNG file Download
📘
How-To Track 6: Deploy

How to Implement Secure Environment Separation

PDF file Download
📄
Template Track 7: Response

Vulnerability Management Policy Template

DOCX file Download
Response & Improvement Overview
Infographic Track 7: Response

Response & Improvement Overview

PNG file Download
Vulnerability Management Lifecycle
Infographic Track 7: Response

Vulnerability Management Lifecycle

PNG file Download
Coordinated Vulnerability Disclosure
Infographic Track 7: Response

Coordinated Vulnerability Disclosure

PNG file Download
📄
Template Track 7: Response

Vulnerability Disclosure Policy Template

DOCX file Download
📄
Template Track 7: Response

Incident Response Plan Template

DOCX file Download
Incident Response Phases
Infographic Track 7: Response

Incident Response Phases

PNG file Download
Security Logging Pipeline
Infographic Track 7: Response

Security Logging Pipeline

PNG file Download
✅
Checklist Track 7: Response

Security Logging Implementation Checklist

PDF file Download
📘
How-To Track 7: Response

How to Conduct an OWASP SAMM Self-Assessment

PDF file Download
OWASP SAMM Maturity Model
Infographic Track 7: Response

OWASP SAMM Maturity Model

PNG file Download
Software Decommissioning Process
Infographic Track 7: Response

Software Decommissioning Process

PNG file Download
📄
Template Track 7: Response

Software Decommissioning Plan Template

DOCX file Download