CISM Certified Information Security Manager – Question0490
At what stage of the applications development process would encryption key management initially be addressed? A. Requirements development B. Deployment C. Systems testing D. Code reviews
Correct Answer: A
Explanation:
Explanation:
Encryption key management has to be integrated into the requirements of the application’s design. During systems testing and deployment would be too late since the requirements have already been agreed upon. Code reviews are part of the final quality assurance (QA) process and would also be too late in the process.
Please disable your adblocker or whitelist this site!