We attacked security on this project paying attention to four key considerations.
Business Analysis
User Journey Mapping
Rapid Prototyping
System documentation
Prototyping
Information Architecture
User Research and User Testing
Accessibility Level 1
Unique custom architecture
Database design
System integration
Secure Infrastructure build
High Level Graphics
Asset design
User Testing
Dedicated project manager
Support and monitoring
Close integration with IT SecurityPolicies
Cleanup and data destruction