Security Deployment Inspection
From Guidance Share
Application security is dependent upon the security of the underlying infrastructure on which the application is deployed. The deployment review, depending upon your application, will cover configuration of both the network and the host. When you review your security deployment, you can organize the precautions you must take and the settings you must configure into categories. By using these configuration categories, you can systematically review the entire application, or pick a particular category and complete specific steps.
Example: Server Configuration Categories