The correct answer is using a software composition analysis tool to identify known vulnerabilities. Software composition analysis tools inventory all third-party components in an application, check them against databases of known vulnerabilities, and alert developers to security issues. This enables informed decision-making about which components to use and when updates are needed.
Implementing a formal vendor security assessment process is a good security practice but may not identify specific vulnerabilities in the components themselves. This approach focuses on the vendor's security practices rather than the actual code being used.
Restricting usage to components from vendors with published security policies provides some assurance but doesn't guarantee that the components themselves are free from vulnerabilities. Published policies don't necessarily translate to secure code.
Conducting manual code reviews of all third-party components is thorough but impractical for most organizations due to resource constraints and the vast amount of code in modern libraries and frameworks. Manual reviews may also miss vulnerabilities that automated tools can more readily identify through comparison with vulnerability databases.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What are software composition analysis tools?
Open an interactive chat with Bash
What are known vulnerabilities and how do they affect software security?
Open an interactive chat with Bash
How does vendor security assessment differ from using software composition analysis?
Open an interactive chat with Bash
ISC2 CISSP
Software Development Security
Your Score:
Report Issue
Bash, the Crucial Exams Chat Bot
AI Bot
Loading...
Loading...
Loading...
IT & Cybersecurity Package Join Premium for Full Access