Mechanisms exist to perform threat modelling and other secure design techniques, to ensure that threats to software and solutions are identified and accounted for.
Does the organization perform threat modelling and other secure design techniques, to ensure that threats to software and solutions are identified and accounted for?