Software composition analysis identifies and evaluates third-party components and dependencies so known security risk in the software supply chain can be managed.
Dynamic application security testing evaluates a running application from the outside to identify security weaknesses in behavior and exposed functionality.
Secrets management is the practice of securely storing, distributing, rotating, and controlling access to sensitive credentials and cryptographic material.
Runtime application self-protection monitors application behavior from inside the running application and can help detect or block suspicious activity in context.
API security is the application-security discipline focused on protecting interfaces, tokens, data flows, and backend actions from unauthorized access, abuse, and misuse.
Common Weakness Enumeration is a standardized catalog of software weakness types used to classify recurring design, implementation, and architecture problems in security terms.
Broken access control is an application-security failure in which a system does not correctly enforce what an authenticated user, service, or tenant should be allowed to access or change.
A software bill of materials is a structured inventory of the components, libraries, packages, and dependencies that make up a software product from a supply-chain perspective.
Threat modeling is the design-time process of identifying what could go wrong in a system, where trust boundaries exist, and which controls should reduce the most meaningful risks.
Command injection is an application flaw in which untrusted input reaches operating-system command execution in ways that let the application lose control over what the host actually runs.
Content Security Policy is a browser-enforced security mechanism that restricts which content sources a page may load or execute and helps reduce the impact of unsafe script behavior.
Insecure direct object reference is an access-control failure where an application exposes object identifiers without enforcing whether the requester should be allowed to use them.
Session hijacking is the unauthorized takeover or misuse of a valid application session so an attacker can act as an authenticated user without repeating the normal login flow.