To mitigate against software vulnerabilities (including SQL injections and Username enumeration), we follow OWASP PHP security and NGINX guidelines.
For more information, refer to the OWASP Application Security Verification Standard 3.0 documentation, and Symfony’s security best practices documentation.