Application security review of functional specifications

Preparation

Understanding the Application

Threat Modeling

Security Requirements Assessment

Review of Functional Specifications

Integration with Other Systems

User Experience and Security

Final Review and Recommendations

Documentation and Follow-Up