Which concept is demonstrated when every module in a particular abstraction layer of a computing environment can only access the information and resources that are necessary for its legitimate purpose?
Which threat modeling step identifies the assets that need to be protected?
Which type of security analysis is performed by reviewing source code line-by-line after other security analysis techniques have been executed?
Company leadership has discovered an untapped revenue stream within its customer base and wants to meet with IT to share its vision for the future and determine whether to move forward.
Which phase of the software development lifecycle (SDLC) is being described?