The original FAQ content is well-structured and accurate, requiring minimal changes. I made one small improvement to enhance clarity in point 3 by changing 'such as encryption methods or access controls' to 'including encryption methods, access controls, and any credential management practices.' This provides a clearer list format and adds credential management, which is relevant for custom metadata security controls.
For security rules selection:
- ApexBadCrypto: Selected because the FAQ mentions 'encryption methods' in point 3, and this rule detects weak cryptographic implementations that would be relevant when documenting encryption in custom metadata security controls.
- ApexCRUDViolation: Selected because custom metadata security controls often involve data access patterns, and this rule identifies missing CRUD/FLS checks that would be important to document and address.
- ApexSharingViolations: Selected because custom metadata security controls frequently implement sharing logic, and this rule identifies sharing bypass issues that would need documentation in security reviews.
- AvoidHardcodedCredentialsInFieldDecls: Selected because point 3 discusses credential management practices, and this rule detects hardcoded credentials in field declarations which is a security concern for custom metadata implementations.
- AvoidHardcodedCredentialsInVarDecls: Selected because point 3 discusses credential management practices, and this rule detects hardcoded credentials in variable declarations which is relevant for custom metadata security implementations.
- ProtectSensitiveData: Selected because custom metadata security controls inherently deal with protecting sensitive data, and this rule identifies potential sensitive data exposure issues that would be critical to document in security reviews.