Bash, the Crucial Exams Chat Bot
AI Bot

Secure Software Concepts (CSSLP)  Flashcards

ISC2 Certified Secure Software Lifecycle Professional (CSSLP) Flashcards

Session management
Secure logging and monitoring
Threat modeling
Process of identifying and prioritizing security threats and vulnerabilities
Controlling how user sessions are managed to prevent hijacking or misuse
DevSecOps integration
Security awareness training
Educating development teams about secure coding and practices
Practices to ensure all security-relevant events are recorded and reviewed
Process to identify, assess, and prioritize minimizing risks in software systems
Risk management
Embedding security practices and tools into the DevOps workflow
FrontBack
Application securityMeasures taken to ensure software is resistant to unauthorized access and data breaches
AuthenticationProcess to verify entity identity before allowing software interaction
AuthorizationDetermines what actions authenticated users or systems can perform
Code reviewAnalyses of source code to identify security flaws and improve quality
Cryptographic key managementSafeguarding the generation, use, and storage of cryptographic keys
Data classificationCategorizing data based on sensitivity to guide appropriate security controls
Dependency managementProcess of identifying, tracking, and securing software libraries and packages
DevSecOps integrationEmbedding security practices and tools into the DevOps workflow
Dynamic analysisTesting the running software to discover runtime vulnerabilities
EncryptionProcess of converting data to protect its confidentiality during transmission and storage
Error handlingEnsuring software errors do not leak sensitive data or provide information to attackers
Identity managementSystems and processes for managing user identities and controlling access to resources
Incident response planningPreparing for identifying, mitigating, and recovering from security incidents in software
Input validationEnsuring application processes input securely to avoid injection attacks
Mobile application securityUnique considerations for securing software designed for mobile devices
OWASP Top TenList of common software vulnerabilities and security risks provided by OWASP
Patch managementProcess to update software to fix bugs and security vulnerabilities
Principle of least privilegeEnsuring users and systems have only the access necessary to perform their tasks
Privacy by designConcept to integrate privacy into software design and development from the beginning
Risk managementProcess to identify, assess, and prioritize minimizing risks in software systems
Runtime application self-protection (RASP)Security technology that protects applications while they are executing
Secure API designPrinciples for protecting exposed APIs from unauthorized access and abuse
Secure codingPractices that reduce risks of vulnerabilities during code development
Secure configuration managementMaintaining secure settings for systems, software, and infrastructure
Secure deploymentSteps to ensure applications are securely configured before releasing
Secure lifecycle phasesStages of development ensuring security considerations throughout SDLC
Secure logging and monitoringPractices to ensure all security-relevant events are recorded and reviewed
Secure software designImplementing principles like least privilege and defense in depth in architecture
Security awareness trainingEducating development teams about secure coding and practices
Security governanceEstablishing policies and standards to align software security with organizational goals
Security misconfigurationConfiguration vulnerabilities that can leave systems exposed to attack
Security requirementsIdentifying and incorporating security-specific needs during software development
Security testingEvaluation of an application to find flaws in its security mechanisms
Session managementControlling how user sessions are managed to prevent hijacking or misuse
Software composition analysis (SCA)Identifying open-source components and their vulnerabilities in a codebase
Static analysisExamination of source code without executing the program to find flaws
Supply chain securityMitigating risks associated with third-party software and dependencies
Threat intelligence integrationUsing external and internal intelligence to anticipate and prevent attacks
Threat modelingProcess of identifying and prioritizing security threats and vulnerabilities
Zero trustSecurity model where access is restricted and requires verification, regardless of network location
Front
Risk management
Click the card to flip
Back
Process to identify, assess, and prioritize minimizing risks in software systems
Front
Dynamic analysis
Back
Testing the running software to discover runtime vulnerabilities
Front
DevSecOps integration
Back
Embedding security practices and tools into the DevOps workflow
Front
Threat intelligence integration
Back
Using external and internal intelligence to anticipate and prevent attacks
Front
Application security
Back
Measures taken to ensure software is resistant to unauthorized access and data breaches
Front
Secure software design
Back
Implementing principles like least privilege and defense in depth in architecture
Front
Zero trust
Back
Security model where access is restricted and requires verification, regardless of network location
Front
Static analysis
Back
Examination of source code without executing the program to find flaws
Front
Secure configuration management
Back
Maintaining secure settings for systems, software, and infrastructure
Front
Security governance
Back
Establishing policies and standards to align software security with organizational goals
Front
Code review
Back
Analyses of source code to identify security flaws and improve quality
Front
Security requirements
Back
Identifying and incorporating security-specific needs during software development
Front
Supply chain security
Back
Mitigating risks associated with third-party software and dependencies
Front
Security misconfiguration
Back
Configuration vulnerabilities that can leave systems exposed to attack
Front
Security awareness training
Back
Educating development teams about secure coding and practices
Front
Incident response planning
Back
Preparing for identifying, mitigating, and recovering from security incidents in software
Front
Secure coding
Back
Practices that reduce risks of vulnerabilities during code development
Front
Mobile application security
Back
Unique considerations for securing software designed for mobile devices
Front
Principle of least privilege
Back
Ensuring users and systems have only the access necessary to perform their tasks
Front
Data classification
Back
Categorizing data based on sensitivity to guide appropriate security controls
Front
Software composition analysis (SCA)
Back
Identifying open-source components and their vulnerabilities in a codebase
Front
Secure deployment
Back
Steps to ensure applications are securely configured before releasing
Front
Patch management
Back
Process to update software to fix bugs and security vulnerabilities
Front
Dependency management
Back
Process of identifying, tracking, and securing software libraries and packages
Front
Error handling
Back
Ensuring software errors do not leak sensitive data or provide information to attackers
Front
Security testing
Back
Evaluation of an application to find flaws in its security mechanisms
Front
Threat modeling
Back
Process of identifying and prioritizing security threats and vulnerabilities
Front
Session management
Back
Controlling how user sessions are managed to prevent hijacking or misuse
Front
Authorization
Back
Determines what actions authenticated users or systems can perform
Front
Cryptographic key management
Back
Safeguarding the generation, use, and storage of cryptographic keys
Front
OWASP Top Ten
Back
List of common software vulnerabilities and security risks provided by OWASP
Front
Secure logging and monitoring
Back
Practices to ensure all security-relevant events are recorded and reviewed
Front
Input validation
Back
Ensuring application processes input securely to avoid injection attacks
Front
Identity management
Back
Systems and processes for managing user identities and controlling access to resources
Front
Runtime application self-protection (RASP)
Back
Security technology that protects applications while they are executing
Front
Authentication
Back
Process to verify entity identity before allowing software interaction
Front
Privacy by design
Back
Concept to integrate privacy into software design and development from the beginning
Front
Secure API design
Back
Principles for protecting exposed APIs from unauthorized access and abuse
Front
Encryption
Back
Process of converting data to protect its confidentiality during transmission and storage
Front
Secure lifecycle phases
Back
Stages of development ensuring security considerations throughout SDLC
1/40
This deck covers foundational principles and best practices for secure software development, including threat modeling, risk management, and secure engineering lifecycle concepts.
Share on...
Follow us on...