ISC2 Certified Secure Software Lifecycle Professional (CSSLP) Practice Question
Your team plans to add an open-source JSON parsing library from a public repository to a microservice that accepts user-supplied input. Because the code will run inside the production container image, which action should they take FIRST to address the main security risk associated with untrusted libraries?
Enable compiler stack-canary and position-independent execution flags when building the microservice.
Scan the library and all of its transitive dependencies with a software composition analysis tool to identify published vulnerabilities.
Benchmark the library in a staging environment to measure its impact on application performance.
Obfuscate the library's source code before compiling to make reverse engineering more difficult.
Using an untrusted or third-party library exposes the application to any publicly known or newly introduced vulnerabilities in that component or in the additional packages it pulls in transitively. The appropriate first step is to perform software composition analysis (SCA) or a similar dependency-scanning activity. This will enumerate the full dependency tree and compare component versions against vulnerability databases (e.g., CVE, NVD), allowing the team to determine whether safer versions or compensating controls are required before deployment. Compiler-hardening flags and code obfuscation can add defense-in-depth later, but they do not reveal known flaws already present in the library. Performance benchmarking, while important for capacity planning, does nothing to identify or mitigate security weaknesses.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is Software Composition Analysis (SCA)?
Open an interactive chat with Bash
Why are transitive dependencies significant in security analysis?
Open an interactive chat with Bash
What is a vulnerability database like CVE or NVD?
Open an interactive chat with Bash
ISC2 Certified Secure Software Lifecycle Professional (CSSLP)
Secure Software Implementation
Your Score:
Report Issue
Bash, the Crucial Exams Chat Bot
AI Bot
Loading...
Loading...
Loading...
Pass with Confidence.
IT & Cybersecurity Package
You have hit the limits of our free tier, become a Premium Member today for unlimited access.
Military, Healthcare worker, Gov. employee or Teacher? See if you qualify for a Community Discount.
Monthly
$19.99
$19.99/mo
Billed monthly, Cancel any time.
3 Month Pass
$44.99
$14.99/mo
One time purchase of $44.99, Does not auto-renew.
MOST POPULAR
Annual Pass
$119.99
$9.99/mo
One time purchase of $119.99, Does not auto-renew.
BEST DEAL
Lifetime Pass
$189.99
One time purchase, Good for life.
What You Get
All IT & Cybersecurity Package plans include the following perks and exams .