Complete the code to identify the phase where security requirements are gathered.
The [1] phase involves collecting security needs for the software.
The Requirements phase is where security needs are identified and documented to guide the rest of the development.
Complete the code to name the phase where security controls are planned.
During the [1] phase, security controls and architecture are defined.
The Design phase is when the software's structure and security controls are planned before coding starts.
Fix the error in naming the phase where code is checked for security flaws.
Security flaws are identified during the [1] phase.The Testing phase is when the software is examined to find and fix security vulnerabilities before release.
Fill both blanks to describe the phases where security is integrated and maintained.
Security is integrated during the [1] phase and monitored in the [2] phase.
Security controls are applied during Implementation, and ongoing security is maintained during Maintenance.
Fill all three blanks to complete the secure SDLC phases in order.
The phases are [1], [2], and [3] in the early stage of Secure SDLC.
The early stages of Secure SDLC start with Requirements, then Design, followed by Implementation.