====This is WORK IN PROGRESS====

Proposed guidelines

How to determine security issues

Best Practices