Chapter 8Software Development Security (Domain 8)

SUBDOMAINS

  • 8.1 Understand and integrate security into the Software Development Life Cycle (SDLC)
  • 8.2 Identify and apply security controls in software development ecosystems
  • 8.3 Assess the effectiveness of software security
  • 8.4 Assess security impact of acquired software
  • 8.5 Define and apply secure coding guidelines and standards
  1. Susan provides a public RESTful API for her organization's data but wants to limit its use to trusted partners. She intends to use API keys. What other recommendation would you give Susan to limit the potential abuse of the service?
    1. Limit request rates.
    2. Force HTTP-only requests.
    3. Avoid tokens due to bandwidth constraints.
    4. Blacklist HTTP methods such as GET, POST, ...

Get ISC2 CISSP Certified Information Systems Security Professional Official Practice Tests, 4th Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.