3 replies

Replying to @coderbyheart
  1. Minimize exposed attack surfaces
  2. Ensure software integrity
  3. Ensure that personal data is secure
  4. Make systems resilient to outages
  5. Examine system telemetry data
  6. Make it easy for users to delete user data
  7. Make installation and maintenance of devices easy