4
answers
1
watching
189
views

A home automation company just purchased and installed tools for its SOC to enable incident identification and response on software the company develops. The company would like to prioritize defenses against the following attack scenarios:

āœ‘ Unauthorized insertions into application development environments

āœ‘ Authorized insiders making unauthorized changes to environment configurations

Which of the following actions will enable the data feeds needed to detect these types of attacks on development environments? (Choose two.)

  1. Perform static code analysis of committed code and generate summary reports.
  2. Implement an XML gateway and monitor for policy violations.
  3. Monitor dependency management tools and report on susceptible third-party libraries.
  4. Install an IDS on the development subnet and passively monitor for vulnerable services.
  5. Model user behavior and monitor for deviations from normal.
  6. Continuously monitor code commits to repositories and generate summary logs.

For unlimited access to Homework Help, a Homework+ subscription is required.

Avatar image
Read by 1 person

Unlock all answers

Get 1 free homework help answer.
Already have an account? Log in
Avatar image
Read by 1 person
Already have an account? Log in
Avatar image
Read by 2 people
Already have an account? Log in
Avatar image
Read by 2 people
Already have an account? Log in

Related questions

Related Documents

Weekly leaderboard

Start filling in the gaps now
Log in