Image

Domain 7

Software Deployment, Operations, Maintenance, and Disposal

ONCE SOFTWARE HAS BEEN formally accepted by the customer or client, it is ready to be installed or released but the installation and deployment process itself needs to be performed with security in mind. Just because software was designed and developed with security in mind, it does not necessarily mean that it will also be deployed with security controls in place. All of the software assurance efforts in designing and building the software can be rendered futile if the deployment process does not take into account security. In fact, it has been observed that software face ...

Get Official (ISC)2 Guide to the CSSLP CBK, 2nd Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.