Design and coding hygiene
- Require threat models and security design reviews for new services, capturing decisions and mitigations against SSDF PO.2 and RV.1 expectations.
- Enforce signed commits and verified identities on protected branches; require reviewers with code owner context for auth, crypto, and data-handling changes.
- Run SAST, secrets scanning, IaC checks, and dependency scanning on every pull request with policy-as-code gates that block high-risk findings.