Most common risks

OAuth

AWS Security features

The security scan methods