01Automated evidence collection templates for infrastructure and application logs
02Compliance-by-design patterns for data classification and audit logging
03SOC 2 Trust Principle mapping for security, availability, and privacy
04Security-sensitive PR checklists to prevent common vulnerabilities
050 GitHub stars
06GDPR data subject rights implementation patterns (Erasure, Portability, Access)