Identify the document that defines the process for ensuring web applications and application interfaces are not vulnerable to cross-site request forgery.
Describe the processes observed to be in place for ensuring that web applications and application interfaces are not vulnerable to cross-site request forgery.