Which security control is MOST effective at detecting unauthorized modifications to third-party software components after they've been integrated into an application?
Software composition analysis with continuous version verification
The correct answer is **code signing verification. **Code signing uses digital signatures to verify the authenticity and integrity of software components. By verifying these signatures before execution, the system can detect if a component has been modified after it was signed by its legitimate author, protecting against unauthorized modifications and tampering.
Runtime application self-protection (RASP) monitoring focuses on detecting and blocking attacks during application execution by analyzing behavior and context. While RASP might detect exploitation of vulnerabilities, it's not specifically designed to detect unauthorized modifications to the components themselves, particularly those that don't trigger behavioral anomalies.
Binary analysis with automated hash comparison involves checking file hashes against expected values to identify changes. While this approach can detect modifications, it requires maintaining a trusted repository of original hashes and doesn't inherently verify the source authenticity of the components like code signing does. Additionally, legitimate updates would trigger false positives unless the hash repository is continuously updated.
Software composition analysis with continuous version verification focuses on identifying and tracking the versions of components used in applications. While this helps manage known vulnerabilities in specific versions, it doesn't directly detect unauthorized modifications to those components. It assumes the integrity of the component repositories and the version identification process.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is the purpose of code signing verification?
Open an interactive chat with Bash
How does code signing differ from binary analysis with hash comparison?
Open an interactive chat with Bash
When should runtime application self-protection (RASP) be used instead of code signing verification?
Open an interactive chat with Bash
ISC2 CISSP
Software Development Security
Your Score:
Report Issue
Bash, the Crucial Exams Chat Bot
AI Bot
Loading...
Loading...
Loading...
Pass with Confidence.
IT & Cybersecurity Package
You have hit the limits of our free tier, become a Premium Member today for unlimited access.
Military, Healthcare worker, Gov. employee or Teacher? See if you qualify for a Community Discount.
Monthly
$19.99
$19.99/mo
Billed monthly, Cancel any time.
3 Month Pass
$44.99
$14.99/mo
One time purchase of $44.99, Does not auto-renew.
MOST POPULAR
Annual Pass
$119.99
$9.99/mo
One time purchase of $119.99, Does not auto-renew.
BEST DEAL
Lifetime Pass
$189.99
One time purchase, Good for life.
What You Get
All IT & Cybersecurity Package plans include the following perks and exams .