14.3.6 Reengineer security controls to mitigate vulnerabilities identified during the operation phase.
14.3.7 Ensure the integration of information security practices throughout the SDLC process.
14.3.8 Document IT or application security control addressed within the system.
14.3.9 Practice secure coding practices.
14.3.10 Implement and test backup-and-restore procedures for critical systems.