ISACA Exam Questions

what stage of the applications development process would encryption key management initially be addr

At what stage of the applications development process would encryption key management initially
be addressed?

A.
Requirements development

B.
Deployment

C.
Systems testing

D.
Code reviews

Explanation:

Encryption key management has to be integrated into the requirements of the application’s design.
During systems testing and deployment would be too late since the requirements have already
been agreed upon. Code reviews are part of the final quality assurance (QA) process and would
also be too late in the process.