From the course: ISC2 Certified Secure Software Lifecycle Professional (CSSLP) (2023) Cert Prep
Unlock the full course today
Join today to access over 24,400 courses taught by industry experts.
Identifying and selecting components
From the course: ISC2 Certified Secure Software Lifecycle Professional (CSSLP) (2023) Cert Prep
Identifying and selecting components
- [Presenter] As organizations continue to adopt more and more third party services, it becomes that much more important to have a process in place for assessing supply chain risk. The first step in this process is to identify and select the components that may introduce risk to your software supply chain. Risk identification starts with an understanding of the scope of your risk assessment. While other domains of the CSSLP focus primarily on software that you've developed internally, your assessment of the software supply chain will require that you turn your attention outward. Just like the production and distribution of a physical good often involves a number of individual organizations, the production and distribution of software also involves multiple participants. For starters, who is providing either code or services for your application? Many, if not most, applications today include open-source software components. A study by Black Duck, an organization that specializes in…
Download courses and learn on the go
Watch courses on your mobile device without an internet connection. Download courses using your iOS or Android LinkedIn Learning app.
Contents
-
-
(Locked)
Secure architecture and design patterns3m 43s
-
(Locked)
Identifying and prioritizing controls6m 15s
-
(Locked)
Traditional application architectures7m 23s
-
(Locked)
Pervasive and ubiquitous computing6m 43s
-
(Locked)
Rich internet and mobile applications7m 9s
-
(Locked)
Cloud architectures7m 8s
-
(Locked)
Embedded system considerations8m 45s
-
(Locked)
Architectural risk assessments6m 59s
-
(Locked)
Component-based systems5m 2s
-
(Locked)
Security enhancing tools4m 8s
-
(Locked)
Cognitive computing4m 37s
-
(Locked)
Control systems8m 34s
-
(Locked)
-
-
(Locked)
Components of a secure environment8m 25s
-
(Locked)
Designing network and server controls4m 22s
-
(Locked)
Designing data controls6m 25s
-
(Locked)
Secure design principles and patterns5m 6s
-
(Locked)
Secure interface design6m 49s
-
(Locked)
Security architecture and design review3m 6s
-
(Locked)
Secure operational architecture3m 37s
-
(Locked)