New Year Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: simple70

APICS Certified in Planning and Inventory Management (CPIM 8.0) CPIM-8.0 Question # 50 Topic 6 Discussion

APICS Certified in Planning and Inventory Management (CPIM 8.0) CPIM-8.0 Question # 50 Topic 6 Discussion

CPIM-8.0 Exam Topic 6 Question 50 Discussion:
Question #: 50
Topic #: 6

During a security incident investigation, a security analyst discovered an unauthorized module was compiled into an application package as part of the application assembly phase. This incident occurred immediately prior to being digitally signed and deployed using a deployment pipeline.

Which of the following security controls would BEST prevent this type of incident in the future?


A.

Invoke code repository vulnerability scanning on a regularly scheduled basis.


B.

Implement Role-Based Access Controls (RBAC) in each component of the deployment pipeline.


C.

Encrypt the application package after being digitally signed.


D.

Implement a software Bill of Materials (BOM) for each application package.


Get Premium CPIM-8.0 Questions

Contribute your Thoughts:


Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.