Bash, the Crucial Exams Chat Bot
AI Bot

Secure Software Concepts (CSSLP) Flashcards

ISC2 Certified Secure Software Lifecycle Professional (CSSLP) Flashcards

Study our Secure Software Concepts (CSSLP) flashcards for the ISC2 Certified Secure Software Lifecycle Professional (CSSLP) exam with 40+ flashcards. View as flashcards, a searchable table, or as a fun matching game.
ISC2 Certified Secure Software Lifecycle Professional (CSSLP) Course Header Image
FrontBack
Application securityMeasures taken to ensure software is resistant to unauthorized access and data breaches
AuthenticationProcess to verify entity identity before allowing software interaction
AuthorizationDetermines what actions authenticated users or systems can perform
Code reviewAnalyses of source code to identify security flaws and improve quality
Cryptographic key managementSafeguarding the generation, use, and storage of cryptographic keys
Data classificationCategorizing data based on sensitivity to guide appropriate security controls
Dependency managementProcess of identifying, tracking, and securing software libraries and packages
DevSecOps integrationEmbedding security practices and tools into the DevOps workflow
Dynamic analysisTesting the running software to discover runtime vulnerabilities
EncryptionProcess of converting data to protect its confidentiality during transmission and storage
Error handlingEnsuring software errors do not leak sensitive data or provide information to attackers
Identity managementSystems and processes for managing user identities and controlling access to resources
Incident response planningPreparing for identifying, mitigating, and recovering from security incidents in software
Input validationEnsuring application processes input securely to avoid injection attacks
Mobile application securityUnique considerations for securing software designed for mobile devices
OWASP Top TenList of common software vulnerabilities and security risks provided by OWASP
Patch managementProcess to update software to fix bugs and security vulnerabilities
Principle of least privilegeEnsuring users and systems have only the access necessary to perform their tasks
Privacy by designConcept to integrate privacy into software design and development from the beginning
Risk managementProcess to identify, assess, and prioritize minimizing risks in software systems
Runtime application self-protection (RASP)Security technology that protects applications while they are executing
Secure API designPrinciples for protecting exposed APIs from unauthorized access and abuse
Secure codingPractices that reduce risks of vulnerabilities during code development
Secure configuration managementMaintaining secure settings for systems, software, and infrastructure
Secure deploymentSteps to ensure applications are securely configured before releasing
Secure lifecycle phasesStages of development ensuring security considerations throughout SDLC
Secure logging and monitoringPractices to ensure all security-relevant events are recorded and reviewed
Secure software designImplementing principles like least privilege and defense in depth in architecture
Security awareness trainingEducating development teams about secure coding and practices
Security governanceEstablishing policies and standards to align software security with organizational goals
Security misconfigurationConfiguration vulnerabilities that can leave systems exposed to attack
Security requirementsIdentifying and incorporating security-specific needs during software development
Security testingEvaluation of an application to find flaws in its security mechanisms
Session managementControlling how user sessions are managed to prevent hijacking or misuse
Software composition analysis (SCA)Identifying open-source components and their vulnerabilities in a codebase
Static analysisExamination of source code without executing the program to find flaws
Supply chain securityMitigating risks associated with third-party software and dependencies
Threat intelligence integrationUsing external and internal intelligence to anticipate and prevent attacks
Threat modelingProcess of identifying and prioritizing security threats and vulnerabilities
Zero trustSecurity model where access is restricted and requires verification, regardless of network location

About the Flashcards

Flashcards for the ISC2 Certified Secure Software Lifecycle Professional (CSSLP) exam present concise definitions and concepts across application security so students can quickly review essential terminology. Topics include secure coding, the OWASP Top Ten, threat modeling and risk management, authentication and authorization, encryption, and secure design principles such as least privilege and defense-in-depth.

The deck also covers practical controls and testing approaches emphasized on the exam: static and dynamic analysis, code review, software composition analysis, secure API and deployment practices, patching and dependency management, runtime protections (RASP), logging and monitoring, incident response, and privacy-by-design. Use the cards to reinforce key ideas, common vulnerabilities, and defensive measures.

Topics covered in this flashcard deck:

  • Secure coding practices
  • OWASP Top Ten
  • Threat modeling and risk
  • Authentication and authorization
  • Static and dynamic analysis
  • Dependency and supply-chain security
Share on...
Follow us on...