Overview
Security documentation — policies and controls
Use /docs/security for auth, secrets, data handling, and review checklists.
Sample outline
- Identity and access
- Data classification
- Incident response pointers
See Authentication for identity patterns and SSDLC for the secure development lifecycle and OWASP-oriented controls.
