Which of the following can be security requirements for the release gate of the design stage?
Threat modeling activities should be performed
Review the uses of third-party components
Review the top common secure design issues
All of the above
Which of the following is not the security gate for the coding stage?
Source codes were scanned by one static code analysis tool
No sensitive information was found in the source code
Service logs were ready for security analysis
High-severity issues in the code scanning results were all checked
Does CVSS stand for Common Vulnerability Scoring System?
Which of the following technologies is commonly used to do authorization for a big data framework?
Apache Ranger
Apache Ambari
TLS ...
Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month, and much more.