The software security team has been tasked with assessing a document management application that has been in use for many years and developing a plan to ensure it complies with organizational policies.
Which post-release deliverable is being described?
Which SDL security goal is defined as ensuring timely and reliable access to and use of information?
Which secure coding practice requires users to log in to their accounts using an email address and a password they choose?
Which threat modeling step collects exploitable weaknesses within the product?