Uncover all the software vulnerabilities.
Safeguard the interest of the software's end users.
Reduce the likelihood that a defective program will enter production.
Preserve the interests of the software producer.
Which of the following should be performed FIRST?
A. Run source code against the latest OWASP vulnerabilities.
B. Document the life-cycle changes that took place.
C. Ensure verification and validation took place during each phase.
D. Store the source code in a software escrow.
E. Conduct a static analysis of the code.