Are You Protected Against Data Leak?

Distributed Denial Of Service (DDoS)

SQL Injection

Cross-Site Scripting (XSS) Attack

RBAC Privilege Escalation