Are You Protected Against Data Leak?
Distributed Denial Of Service (DDoS)
SQL Injection
Cross-Site Scripting (XSS) Attack
RBAC Privilege Escalation