Security checklist - design phase

Business and compliance requirements

  • Define security classification and compliance needs (e.g., GDPR, ISO 27001, SOC 2).
  • Document data residency, retention, and privacy policies.
  • Include security goals and acceptance criteria in scope and user stories.
  • Create an architecture overview showing security-critical components and data flows (roles, personal data, AI/ML, third-party services, etc.).
  • Perform threat modeling to identify and mitigate risks.
  • Estimate user count, roles, and access restrictions for the Xperience administration interface.
  • Allocate resources for security testing, code review, and secure deployment.

Environment security considerations

  • Confirm which deployment environment best fits your business requirements (self-hosted, private cloud, SaaS).
  • Review available security controls for your environment (secrets management, WAF, network isolation, configuration, etc.).

Xperience by Kentico security specifications

  • Map your security requirements to available Xperience features.
  • Review the security guidelines for Xperience and plan your implementation accordingly.
  • Validate your third-party integrations and confirm they meet the required security standards for your environment.
  • Consider the integration of AI features like AIRA and confirm they meet the required security standards for your project and environment.
  • Design authentication and authorization aligned with the least-privilege principle.