Bash, the Crucial Exams Chat Bot
AI Bot

Secure Software Concepts (CSSLP)  Flashcards

ISC2 Certified Secure Software Lifecycle Professional (CSSLP) Flashcards

FrontBack
Application securityMeasures taken to ensure software is resistant to unauthorized access and data breaches
AuthenticationProcess to verify entity identity before allowing software interaction
AuthorizationDetermines what actions authenticated users or systems can perform
Code reviewAnalyses of source code to identify security flaws and improve quality
Cryptographic key managementSafeguarding the generation, use, and storage of cryptographic keys
Data classificationCategorizing data based on sensitivity to guide appropriate security controls
Dependency managementProcess of identifying, tracking, and securing software libraries and packages
DevSecOps integrationEmbedding security practices and tools into the DevOps workflow
Dynamic analysisTesting the running software to discover runtime vulnerabilities
EncryptionProcess of converting data to protect its confidentiality during transmission and storage
Error handlingEnsuring software errors do not leak sensitive data or provide information to attackers
Identity managementSystems and processes for managing user identities and controlling access to resources
Incident response planningPreparing for identifying, mitigating, and recovering from security incidents in software
Input validationEnsuring application processes input securely to avoid injection attacks
Mobile application securityUnique considerations for securing software designed for mobile devices
OWASP Top TenList of common software vulnerabilities and security risks provided by OWASP
Patch managementProcess to update software to fix bugs and security vulnerabilities
Principle of least privilegeEnsuring users and systems have only the access necessary to perform their tasks
Privacy by designConcept to integrate privacy into software design and development from the beginning
Risk managementProcess to identify, assess, and prioritize minimizing risks in software systems
Runtime application self-protection (RASP)Security technology that protects applications while they are executing
Secure API designPrinciples for protecting exposed APIs from unauthorized access and abuse
Secure codingPractices that reduce risks of vulnerabilities during code development
Secure configuration managementMaintaining secure settings for systems, software, and infrastructure
Secure deploymentSteps to ensure applications are securely configured before releasing
Secure lifecycle phasesStages of development ensuring security considerations throughout SDLC
Secure logging and monitoringPractices to ensure all security-relevant events are recorded and reviewed
Secure software designImplementing principles like least privilege and defense in depth in architecture
Security awareness trainingEducating development teams about secure coding and practices
Security governanceEstablishing policies and standards to align software security with organizational goals
Security misconfigurationConfiguration vulnerabilities that can leave systems exposed to attack
Security requirementsIdentifying and incorporating security-specific needs during software development
Security testingEvaluation of an application to find flaws in its security mechanisms
Session managementControlling how user sessions are managed to prevent hijacking or misuse
Software composition analysis (SCA)Identifying open-source components and their vulnerabilities in a codebase
Static analysisExamination of source code without executing the program to find flaws
Supply chain securityMitigating risks associated with third-party software and dependencies
Threat intelligence integrationUsing external and internal intelligence to anticipate and prevent attacks
Threat modelingProcess of identifying and prioritizing security threats and vulnerabilities
Zero trustSecurity model where access is restricted and requires verification, regardless of network location
This deck covers foundational principles and best practices for secure software development, including threat modeling, risk management, and secure engineering lifecycle concepts.
Share on...
Follow us on...