SAST DAST and IAST

12345678910111213141516
Across
  1. 4. The process of fixing vulnerabilities early is __________ than later in development
  2. 6. RASP is implemented after release to protect applications in __________ environments
  3. 8. Security testing method that evaluates code without executing it (abbr.)
  4. 10. A major drawback of SAST is that it produces ______ positives
  5. 13. A method used in DAST to test encryption security
  6. 15. DAST is effective at identifying SQL __________ vulnerabilities
  7. 16. Security testing that checks source code for vulnerabilities (abbr.)
Down
  1. 1. IAST integrates security testing with __________ integration tools
  2. 2. One major advantage of DAST is that it is __________ independent
  3. 3. SAST tools generate detailed __________ that can be tracked and exported
  4. 5. One limitation of SAST is that it struggles to analyze __________ dependencies
  5. 7. Security testing that continuously analyzes applications in production (abbr.)
  6. 9. One advantage of RASP is that it can respond to attacks by terminating the __________
  7. 11. A key advantage of SAST is that it allows for __________ security checks
  8. 12. DAST is used during the __________ and QA phase of the SDLC
  9. 14. Type of security testing that analyzes applications during runtime (abbr.)
  10. 15. A security approach that tests applications as they run but integrates with the application server (abbr.)