Share

  1. About The Author
  2. Introduction
  3. Chapter 1 - The Foundations
  4. 1.1 Application Security Training
  5. 1.2 Empower Your Security Champions
  6. Chapter 2 - The CASM Framework & Integrated Analyses
  7. 2.1 The CASM Framework
  8. 2.2 Integrating Threat Modeling
  9. 2.3 Integrating Static Code Analysis
  10. 2.4 Integrating Dynamic Code Analysis
  11. 2.5 Integrating Dependency Checking
  12. 2.6 Integrating Penetration Testing as a Service
  13. Chapter 3 - Logging & Auditing
  14. Chapter 4 - Internal & External Service Level Agreements
  15. 4.1 Internal Service Level Agreements
  16. 4.2 - External Service Agreements & 4.3 - Communication with Third Party Reporters
  17. 4.4 - Risk Acceptance & The Exception Process
  18. Chapter Separator - Plain