ISACA Exam Questions

At what stage of the applications development process would encryption key management initially be a

At what stage of the applications development process would encryption key management initially be addressed?

A.
Requirements development

B.
Deployment

C.
Systems testing

D.
Code reviews

Explanation:
Encryption key management has to be integrated into the requirements of the application’s design. During systems testing and deployment would be too late since the requirements have already been agreed upon. Code reviews are part of the final quality assurance (QA) process and would also be too late in the process.