๐ฆ Pre-Release Security Checklist
Intro: Use this checklist right before launch, rollout, or a risky production change. The goal is not perfect security; the goal is to avoid shipping known, high-leverage problems.
Best time to use this checklist
Use it for major releases, high-risk features, public API changes, admin workflows, payment flows, auth changes, or any change that expands authority or exposure.
Stop-the-line conditions
- no meaningful rollback or kill switch for a risky feature;
- unresolved broken authorization, authentication, secret exposure, or public storage issue;
- no logging or owner for a feature that handles sensitive actions;
- a major trust-boundary change that nobody actually reviewed.
Text-first review prompts
- What changed in authority, exposure, or data flow?
- Which findings are still open, and which of them are truly release-blocking?
- What is the rollback plan, and who can execute it?
- What feature flag, sync window, or deployment control limits the blast radius?
- What logs, alerts, or dashboards will confirm normal behavior after release?
- Who is on the hook if this breaks in production?
Evidence table
| Control area | What to verify | Typical evidence |
|---|---|---|
| Release blockers | Critical authz/authn, public secret, or exploitable tenant-boundary issues are closed or consciously accepted | ticket list, review notes, exception record |
| Rollback | The rollback path is tested, understood, and owned | runbook, deployment record |
| Observability | High-value events are logged and visible | dashboard, alert, log sample |
| Approval | Required approvers and release controls are in place | pipeline approvals, change ticket |
| Blast radius | Rollout strategy limits impact if behavior is wrong | feature flag, canary, staged rollout plan |
Common misses
- treating โno open critical findingsโ as the same thing as โsafe to releaseโ;
- shipping a new admin action without clear logs;
- assuming rollback works without checking data-migration or config side effects;
- forgetting that a third-party integration change can widen exposure even without code changes.
Related pages
- Production Readiness Security Checklist
- Cloud Change Review Checklist
- Product Security Incident Response Playbooks
---Author attribution: Ivan Piskunov, 2026 - Educational and defensive-engineering use.