Application Identification and Description
Application Vulnerabilities and Threats
Application Security Controls
Application Data Classification and Protection
Application Development and Maintenance Practices
Application Access and Authentication
Application Incident Response and Recovery
Application Compliance and Governance
Application Vendor and Third-Party Risk
Application Risk Mitigation and Remediation