This project contains the security documentation for the security policies and best practices at Caktus Consulting Group. These policies include application development and deployment guidelines as well as instance response guidelines. This is a living set of policies which is actively updated as new threats are discovered and best practices shift.