Which security control is MOST effective at detecting unauthorized modifications to third-party software components after they've been integrated into an application?
The correct answer is **code signing verification. **Code signing uses digital signatures to verify the authenticity and integrity of software components. By verifying these signatures before execution, the system can detect if a component has been modified after it was signed by its legitimate author, protecting against unauthorized modifications and tampering.
Runtime application self-protection (RASP) monitoring focuses on detecting and blocking attacks during application execution by analyzing behavior and context. While RASP might detect exploitation of vulnerabilities, it's not specifically designed to detect unauthorized modifications to the components themselves, particularly those that don't trigger behavioral anomalies.
Binary analysis with automated hash comparison involves checking file hashes against expected values to identify changes. While this approach can detect modifications, it requires maintaining a trusted repository of original hashes and doesn't inherently verify the source authenticity of the components like code signing does. Additionally, legitimate updates would trigger false positives unless the hash repository is continuously updated.
Software composition analysis with continuous version verification focuses on identifying and tracking the versions of components used in applications. While this helps manage known vulnerabilities in specific versions, it doesn't directly detect unauthorized modifications to those components. It assumes the integrity of the component repositories and the version identification process.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is code signing verification and how does it work?
Open an interactive chat with Bash
What are the limitations of using runtime application self-protection (RASP)?
Open an interactive chat with Bash
How is binary analysis with automated hash comparison performed?
Open an interactive chat with Bash
ISC2 CISSP
Software Development Security
Your Score:
Report Issue
Bash, the Crucial Exams Chat Bot
AI Bot
Loading...
Loading...
Loading...
IT & Cybersecurity Package Join Premium for Full Access