Application and Interface Security. Threat modeling should be conducted throughout the software development lifecycle, including vulnerability assessments, including Static/Dynamic scanning and code review, to identify defects and complete remediations before hosting in cloud environments.
Appears in 12 contracts
Sources: Call Off Contract, Master Subscription Agreement, Data Processing Agreement