Which software control test examines an application from a user perspective by providing a wide variety of input scenarios and inspecting the output?
A security architect is creating a data flow diagram and draws an arrow between two circles.
What does the arrow represent?
Which secure coding best practice says to use well-vetted algorithms to ensure that the application uses random identifiers, that identifiers are appropriately restricted to the application, and that user processes are fully terminated on logout?
The software security group is conducting a maturity assessment using the Open Web Application Security Project Software Assurance Maturity Model (OWASP SAMM). They are currently focused on reviewing design artifacts to ensure they comply with organizational security standards.
Which OpenSAMM business function is being assessed?
In which step of the PASTA threat modeling methodology will the team capture infrastructure, application, and software dependencies?
The security team is identifying technical resources that will be needed to perform the final product security review.
Which step of the final product security review process are they in?
Security testers have completed testing and are documenting the results of vulnerability scans and penetration analysis They are also creating documentation lo share with the organization's largest customers.
Which deliverable is being prepared?
Which secure coding best practice says to only use tested and approved components and use task-specific, built-in APIs to conduct operating system functions?
Which software control test examines the internal logical structures of a program and steps through the code line by line to analyze the program for potential errors?