July 2018
Intermediate to advanced
356 pages
9h 18m
English
For third-party component management and review, it's suggested to have the following security guidelines:
This will allow every project to follow consistent criteria to introduce external third-party software components.
Having an internal third-party component database allows the project team to cross-reference what projects may have used third-party components and the integration approaches.
Any third-party components may introduce security risks. Track and plan for security patch updates as part of the operation team's routine tasks.
Read now
Unlock full access