The FAQ content is accurate and current. I made minor improvements for clarity and consistency: changed 'Do not' to 'Don't' for a more conversational tone, and simplified some phrasing while preserving all technical content and structure.
I selected two related security rules:
**ApexCRUDViolation**: This rule directly relates to points 1, 2, and 3 in the FAQ. The FAQ discusses performing DML operations on objects, updating sensitive fields, and controlling field access for read operations - all of which involve CRUD (Create, Read, Update, Delete) operations that this rule validates for proper security enforcement.
**ApexSharingViolations**: This rule directly relates to point 4 in the FAQ. The FAQ specifically mentions using 'without sharing' Apex classes for guest user contexts, which is exactly what this rule analyzes - proper use of sharing keywords (with sharing, without sharing, inherited sharing) in Apex classes to ensure appropriate data access controls.