ISC2 Certified Secure Software Lifecycle Professional (CSSLP) Practice Question
While performing threat analysis on a new microservices-based payment platform, the security architect has listed all assets, external actors, and use cases. To understand how an attacker might cross trust boundaries and where additional controls are needed, what should the team create next?
An annotated data flow diagram that includes processes, data stores, data flows, and trust boundaries.
A vulnerability scan report listing current component CVSS scores.
A compliance requirements matrix mapping regulatory controls to system features.
A risk acceptance memorandum signed by executive stakeholders.
In threat analysis, once assets and actors are identified, security practitioners typically decompose the system with an annotated data flow diagram (DFD). A DFD shows processes, data stores, data flows, and-crucially-trust boundaries. Mapping these elements helps analysts visualize where untrusted inputs enter, how data moves, and where threats such as spoofing, tampering, or elevation of privilege can arise. A risk acceptance memo or compliance matrix may be produced later, but they do not reveal the technical paths an attacker could exploit. A vulnerability scan report is focused on known software flaws, not architectural paths or missing controls, and therefore is created after the threat analysis is complete.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is an annotated data flow diagram (DFD) and why is it important in threat analysis?
Open an interactive chat with Bash
What are trust boundaries, and why are they significant in threat analysis?
Open an interactive chat with Bash
How does an annotated DFD differ from other analysis tools like a vulnerability scan or compliance matrix?
Open an interactive chat with Bash
What is a Data Flow Diagram (DFD)?
Open an interactive chat with Bash
What are trust boundaries, and why are they important in threat analysis?
Open an interactive chat with Bash
Why are vulnerability scans not sufficient for threat analysis?
Open an interactive chat with Bash
ISC2 Certified Secure Software Lifecycle Professional (CSSLP)
Secure Software Architecture and Design
Your Score:
Report Issue
Bash, the Crucial Exams Chat Bot
AI Bot
Loading...
Loading...
Loading...
Pass with Confidence.
IT & Cybersecurity Package
You have hit the limits of our free tier, become a Premium Member today for unlimited access.
Military, Healthcare worker, Gov. employee or Teacher? See if you qualify for a Community Discount.
Monthly
$19.99
$19.99/mo
Billed monthly, Cancel any time.
3 Month Pass
$44.99
$14.99/mo
One time purchase of $44.99, Does not auto-renew.
MOST POPULAR
Annual Pass
$119.99
$9.99/mo
One time purchase of $119.99, Does not auto-renew.
BEST DEAL
Lifetime Pass
$189.99
One time purchase, Good for life.
What You Get
All IT & Cybersecurity Package plans include the following perks and exams .