An application developer is concerned about safeguarding his application against unauthorized code execution via third-party libraries. Which of the following methods would BEST mitigate the risk of an unauthorized Dynamic-link library (DLL) being injected and executed by the application?
Enforce code signing of the third-party libraries.
Restrict administrative privileges for all application users.
Run the application within a restricted sandbox environment.
Require all dynamic libraries to include a valid digital certificate.
|Attacks, Threats, and Vulnerabilities
|Architecture and Design
|Operations and Incident Response
|Governance, Risk, and Compliance