A deployment manager is working
with a software development group to assess the security of a new version of the organization-s internally developed ERP tool. The organization prefers to not perform assessment activities following deployment, instead focusing on assessing security throug
hout the life cycle. Which of the following methods would BEST assess the security of the product?
A. Static code analysis in the IDE environment
B. Penetration testing of the UAT environment
C. Vulnerability scanning of the production environment
D. Pene
tration testing of the production environment
E. Peer review prior to unit testing