A. Corporate reputation is maintained when practicing good authentication and data validation procedures
B. Trust between two parties is enhanced by a set of practices that validate integrity of data transmissions
C. Confidence between consumer and provider is achieved when users manage passwords *i a defined way
D. Neither the sender nor the recipient of information or activity can later deny the transaction took place
A. Not establishing all the product requirements prior to the first iteration
B. Not developing comprehensive documentation and training material
C. Not prioritizing the set of critical customer feature in the current sprint
D. Not including the addition of security controls in the definition of done
A. Kinesthetic
B. Demonstration
C. Observe live
D. Story based
A. Data must be kept secure to prevent leaking to other applications
B. They must be designed to run safely outside of the secure network
C. Secrets information must be stored for secure back-end service calls
D. Source code must be checked for programmatic and stylistic errors