Mechanisms exist to develop applications based on secure coding principles.
Does the organization develop applications based on secure coding principles?