Go-Live Security Checklist¶
Use this checklist alongside Scenario: Security Review Before Go-Live. Complete before deploying any Tier 2+ solution to production.
Applies To
Audience: Solution Maker · Fusion Team Lead · Security Architect · CoE Lead Frameworks: SHIELD · DIALOGE · BOLT
How to Use This Checklist¶
Complete the tier-appropriate section. Items marked [ALL] apply to all tiers. Items marked [T2+], [T3+], [T4] apply from that tier upward.
Section 1 — Identity & Access¶
- [ ] [ALL] Solution sharing is restricted — not shared with "Everyone" or "All users in organisation" unless explicitly approved
- [ ] [ALL] External sharing is disabled unless the solution is designed for external users and has been approved
- [ ] [T2+] Connections use service accounts, not the maker's personal credentials
- [ ] [T2+] Service accounts follow the least-privilege principle — only the permissions the solution actually needs
- [ ] [T3+] App-level roles are defined — users are assigned roles, not given direct admin access
- [ ] [T3+] Guest access has been reviewed and restricted if not required
- [ ] [T4] Authentication is integrated with organisational identity provider (AAD / Entra ID)
Section 2 — Data Protection¶
- [ ] [ALL] The data classification of all data accessed by the solution has been identified
- [ ] [ALL] No sensitive data is stored in solution descriptions, titles, or environment variables in plain text
- [ ] [T2+] Dataverse row-level security (Business Units / Security Roles) is configured for sensitive tables
- [ ] [T2+] Column-level security is applied to sensitive fields (salary, health data, PII)
- [ ] [T3+] Data residency requirements have been verified for all connected data sources
- [ ] [T3+] Secrets and credentials are stored in Azure Key Vault — not hardcoded in flows or apps
- [ ] [T4] Data retention and deletion policies are implemented and tested
Section 3 — Connector & Integration Security¶
- [ ] [ALL] All connectors used are on the approved connector list for the target environment
- [ ] [ALL] No blocked connectors are present in the solution
- [ ] [T2+] Custom connectors have been reviewed and registered in the connector catalogue
- [ ] [T2+] API connections use secure authentication (OAuth2, managed identity — not API keys in plain text)
- [ ] [T3+] HTTP connectors are used only where necessary and have been reviewed
- [ ] [T3+] Outbound connections to external services have been documented and approved
Section 4 — Application Security¶
- [ ] [T2+] Solution checker has been run and all critical and high-severity findings are resolved
- [ ] [T2+] Error handling is implemented — flows and apps fail gracefully without exposing system details
- [ ] [T3+] Input validation is in place — user-supplied data is validated before use in queries or actions
- [ ] [T3+] No sensitive data is logged in plain text in flow run history or application insights
- [ ] [T4] Application has been peer-reviewed by a qualified solution engineer
Section 5 — Deployment & ALM¶
- [ ] [ALL] Solution is deployed as a managed solution to production (not unmanaged)
- [ ] [T2+] Solution has been deployed through the approved pipeline — not manually exported and imported
- [ ] [T2+] Connection references are used (not hardcoded connection IDs)
- [ ] [T2+] Environment variables are used for environment-specific configuration
- [ ] [T3+] Solution is in source control with a documented version history
- [ ] [T3+] A rollback procedure has been documented and tested
- [ ] [T4] Deployment has been approved by the Change Advisory Board or equivalent
Section 6 — Monitoring & Observability¶
- [ ] [T2+] Flow run history retention is configured
- [ ] [T2+] A named owner is assigned to the solution in the CoE inventory
- [ ] [T3+] Application Insights is configured for canvas apps or portals
- [ ] [T3+] Alerts are configured for critical flow failures
- [ ] [T4] Operational runbook exists — documented procedures for common issues
Section 7 — Compliance¶
- [ ] [T3+] Applicable regulatory requirements have been identified (GDPR, ISO 27001, SOC2, sector-specific)
- [ ] [T3+] Data subject access request (DSAR) process is documented if personal data is processed
- [ ] [T4] Data Protection Impact Assessment (DPIA) has been completed if required
- [ ] [T4] Legal and compliance sign-off obtained
Sign-Off¶
| Role | Name | Date | Signature |
|---|---|---|---|
| Solution Owner (Maker / Fusion Team Lead) | |||
| CoE Lead (Tier 2+) | |||
| Security Architect (Tier 3+) | |||
| CISO / Data Protection Officer (Tier 4) |